Trust no one. - DriveThruRPG.com

8
Sample file

Transcript of Trust no one. - DriveThruRPG.com

Page 1: Trust no one. - DriveThruRPG.com

Trust no one.The very nature of Aegis' work means that the organization has to work in secret, away from public scrutiny and hidden from the keen surveillance of their enemies. The National Defense Directorate

manipulates and schemes in secret bases around the country, plotting and moving pawns in a deadly chess game of deception. A conspiracy against another conspiracy.

Aegis' secret agenda is the core of a conspiracy, but that conspiracy is built upon an alteredand secret history - a conspiracy within a conspiracy. Lies within lies. A conspiracy against

their own operatives. When faced with many conspirators, who can you trust?

This is the hidden world of Conspiracy X, where Aegis battles the NDD for control and superiorityin a fight where both sides think they are doing what is best for humanity.

Where cults and secret societies work behind the scenes, infiltrating and being infiltrated in turn. But the truthis far more shocking than anyone could have foreseen and will rock the agents' beliefs to the very core.

The Conspiracies Sourcebook is a supplement for the Conspiracy X 2.0 roleplaying game. In it, you will find:• Details on the history and structure of the National Defense Directorate, including their advanced weaponryreverse engineered from alien technology, as well as details of their operations working both against and collaborating with the various alien races.

• The true history of The Watch, finally revealing the truth behind the split that formed Aegis and the NationalDefense Directorate.

• Never-before-seen background information on Aegis, as well as a detailed overview of Area 51 and the various divisions at the core of the conspiracy.

• Rules for creating smaller conspiratorial groups and cults, as well as many example groups that can be pluggedinto an existing game.

• A radically new development in the Conspiracy X world that will have agents doubting who or what they can trust.

Compatible with All Flesh Must Be Eaten, Armageddon, Terra Primate, CJ Carella’s Witchcraft and other Unisystem games.

www.edenstudios.netConspiracy X™, artwork, text, icons, characters and

personalities are copyright ©2013 George Vasilakos

All Flesh Must Be Eaten™, Armageddon™, Terra

Primate™, CJ Carella’s Witchcraft™ ©2013 Eden

Studios, Inc. Unisystem™, copyright ©2013 C.J. Carella

Published under exclusive license.

All Rights Reserved.

Produced and published by Eden Studios, Inc.

Conspiracy X™, artwork, text, icons, characters and

personalities are copyright ©2013 George Vasilakos

All Flesh Must Be Eaten™, Armageddon™, Terra

Primate™, CJ Carella’s Witchcraft™ ©2013 Eden

Studios, Inc. Unisystem™, copyright ©2013 C.J. Carella

Published under exclusive license.

All Rights Reserved.

Produced and published by Eden Studios, Inc.

EDN

5602$35.00 (US) EDN5603

ISBN 978-1-933105-33-X

$35.00 (US) EDN5603

ISBN 978-1-933105-33-X

www.edenstudios.net

GAME SYSTEM

Trust no one.The very nature of Aegis' work means that the organization has to work in secret, away from public scrutiny and hidden from the keen surveillance of their enemies. The National Defense Directorate

manipulates and schemes in secret bases around the country, plotting and moving pawns in a deadly chess game of deception. A conspiracy against another conspiracy.

Aegis' secret agenda is the core of a conspiracy, but that conspiracy is built upon an alteredand secret history - a conspiracy within a conspiracy. Lies within lies. A conspiracy against

their own operatives. When faced with many conspirators, who can you trust?

This is the hidden world of Conspiracy X, where Aegis battles the NDD for control and superiorityin a fight where both sides think they are doing what is best for humanity.

Where cults and secret societies work behind the scenes, infiltrating and being infiltrated in turn. But the truthis far more shocking than anyone could have foreseen and will rock the agents' beliefs to the very core.

The Conspiracies Sourcebook is a supplement for the Conspiracy X 2.0 roleplaying game. In it, you will find:• Details on the history and structure of the National Defense Directorate, including their advanced weaponryreverse engineered from alien technology, as well as details of their operations working both against and collaborating with the various alien races.

• The true history of The Watch, finally revealing the truth behind the split that formed Aegis and the NationalDefense Directorate.

• Never-before-seen background information on Aegis, as well as a detailed overview of Area 51 and the various divisions at the core of the conspiracy.

• Rules for creating smaller conspiratorial groups and cults, as well as many example groups that can be pluggedinto an existing game.

• A radically new development in the Conspiracy X world that will have agents doubting who or what they can trust.

Compatible with All Flesh Must Be Eaten, Armageddon, Terra Primate, CJ Carella’s Witchcraft and other Unisystem games.

ConXConspCover_Layout 1 3/14/13 4:45 PM Page 1

Sam

ple

file

Page 2: Trust no one. - DriveThruRPG.com

Sam

ple

file

Page 3: Trust no one. - DriveThruRPG.com

The Conspiracies Sourcebook

Conspiracy X – Second Edition (Unisystem)

Producers: M. Alexander Jurkat, George Vasilakos Line Developer: David F. Chapman Director: George Vasilakos

Writing and Conversion: David F. Chapman

Susanne Johnson (Conspiracies, Aegis, and Black Book), Bernard C. Trombley (Conspiracies and Black Book), T. J. Talamini (Black Book)Unisystem Game Design: C.J. Carella

Original Concepts and Writing: Rick Ernst, Shirley Madewell, and Chris Pallace Editing: Janice Sellers, M. Alexander Jurkat

Layout and Graphics: George Vasilakos Cover Art: C. Brent Ferguson

Interior Art: Jason Steve Bryant, C. Brent Ferguson, Heather McKinney, Jason Nadeau, Scott Neely, Michael Osadciw, Paul Phillips, Cary Polkovitz,Christopher Shy, George Vasilakos

Playtesting: Bret Canney, Tim Maytom, Owen Badham

Special Thanks to James Brown, Nick Ingham, John Snead, and the people who helped fund this book on Kickstarter to get it printed!

Believer: Randall Dederick, James Chambers, Michelle "mikrima" Martin, Rick Loomis, Trask Al'Jeek, Christy Burge, Jacob "MooseCake" Kernohan

CORS Agent: Adam Boisvert, Adi Marcus, Bastien Pilon, Charles Meigh, Chris Fazio, Chris Huning, Chris Jahn, conan, David Jenks, Gary Trost, Geoffrey Tillman, Harry Russell, James Robertson,Jason Anderson, Jason Freston, Jason Kurtz, Jeff Eaton, Jeremy Fridy, John Clayton, John Kelbaugh, John Smith, Jonathan Topham, Julie STratton, Keith Johnson, Lennie Lenford, Lon Braidwood,Mark Kadas, Michael Beck, Michael Bentley, Mike Bassler, Mr Andrew Norman, Nelson Ruger, Noodles, P Tracy, Paris Conte, Patrick Sniegoski, Pawel Sowizral, Peter Trueman, Ralph Dukes,Robert C. Kim, Ross Nicoll, Ryan Wilkerson, Scott Ballantyne, Scott Vandervalk, Sean Murphy, Steve Anderson, Steven Darlington, The Cementbloc/Radek Drozdalski, Tim Walker, Xavier Freycon

Spreading the Lies: Herman Duyker, John Ellis, Jonas Christensen, Jordan Bowman, Marius Bredsdorff, Michael Mattei, Micheal Parker, Ray Spitz, Svend Andersen

Conspiracy Theorist: Aaron Wong, Adam Rajski, Adrian Reynolds, Alexandre T Yamao, Amiel Kievit, Ana Silva, Andreas Sundgren, Andrew Berthiaume, Andrew Ross, Andrew Schubert, AngusAbranson, Anthony S. Vornheder, Austin Stanley, Benoit Devost, Bjørn Ove Asprem, Brett Purcivall, Brian Isikoff, Chad Bowser, Chad Hughes, Chris Allison, Chris Davis, Chris Harvey, Chris Quin,Christian Turkiewicz, Christopher Church, Christopher Hatty, Christopher Snyder, Dan Adamski, Daniel Steadman, Daniel Walker, Darrin Fesperman, Dave Chapman, Dave Ellingwood, DerekPotter, Dr Matthew R Broome, Eric Edwards, Fabrice Breau, Felix Shafir, Frank Rafaelsen, Gareth Clifford, Gerry Saracco, Gordon D. Duke, Greg Walters, Harald Schlang, Jack Emmert, JacobBoersma, James Galloway, James Richard Brown, James Silvers, Jason L Blair, Jason Marks, Jason Willetts, Jeff Pittman, Jennifer Parr, Jens Renberg, John Larkin, John Morrow, John Thompson,Jonathan Souza, Jose LaCario, José Luis Nunes Porfírio, Joseph Connell, Joseph Davis, Joshua D. Meadows, Jussi Myllyluoma, Keith Nielsen, Kelly Stanaway, Kevin Moldenhauer, Kevin Wong,Kurt McMahon, Kurtis Evans, Leath Sheales, Leó Páll Hrafnsson, Mark Solino, Matthew Wasiak, Michael Ehrhardt, Michael Gorczyca, Michael Smith, Mick Moss, Mike Browne, Mike J. Murtha,Mike Lowrey, Monte Cook, Morgan Ellis, Mr Duncan Webster, Mr H Kanth, Nate Elwood, Nicholas Muehlenweg, Olivia Hunt, Olivier Vigneresse, Owen Thompson, Pål Are Nordal, PatrickDargirolle, Patrick Vaughan, Peter Aronson, Peter Hurley, Petri Wessman, Philip Burge, Philip K. Sharp Garcia, Philip Stein, Phillip Fatka, Renato Retz de Carvalho, Richard Degrou, Richard Forster,Rob Farley, Robbie Corbett, Robby Anderson, Robert D McCuaig, Robert Harrison, Robert Rosenthal, Roger Kernsmith, Seana McGuinness, Shaun Kennedy, Shawn Craig, Stefan Ohrmann,Stephen Forscutt, Steve Ellis, Steven Vest, Susan Jones, The Roach, Thomas G. Gately, Thomas Gronek, Tim Soholt, Timothy Yablonsky, Tyler Dion, Wajanai Snidvongs, William Miller

Internet Conspiracy Theorist: Alexander Hawson, Bo Bratsberg, Bryan Fowler, Chris Morrell, David Lystlund, Gerolf Nikolay, Jason Buchanan, Jochen, John Hacker, John Stryker, Josh Traub, KayBurns, Kennon Bauman, Kevin Flynn, Leslie Smith, Mark Whittington, Michael Miguel-Sanchez, Paulo Bernardi Baccarat, Philip Harney, Reto M. Kiefer, Richard Osterhout, Tom Reed

Conspiracy Seeker: Arnaud Martin, Dan Hagy, Douglas Grimes, Ed Kowalczewski, Edouard Contesse, Edward Ludemann, Gareth P. McSorley, Gary Page, Iain Anderson, Jake Papas, Jason Nell, JohnFrewing, Lars Schear, Matthew Moorman, Michael Calabrese, Michael Richards, Stefano Cinotti, Trentin Bergeron, Walter F. Croft

AEGIS Field Agent: Andrew Chang, Andrew MacLennan, Ben McCallum, Brian Davidson, Bruno Pereira, Derick Eddy, Erik Conradi, Greg Chapin, Hadley Shurmer, James Dyer, Mark Radford, MikeMusteric, Paul Cooper, Sean Wolf, Stephen Esdale, Zachary Pollak

AEGIS New Recruit: Adam Whitcomb, Aric Wieder, Brett Bozeman, Brian Snodgrass, Calvin Shafer, Christophe Crinon, Christopher Cowles, Damian Siech, David Odie, David Rybacki, Ged Trias,Ingo Beyer, Jason J Middleton, Keith Preston, Kenny Chik, Kyle MacKay, Kyle Pinches, Matthew Sanderson, Nathan Dilday, Pentland Chapin, Robert Perkins, Ross Thompson, Sara Grocott, ScottGalliand, Seth Hoover, Steven Pope, Thomas Vanstraelen, Vincent Ecuyer, Zachary Hopko

Smoking Gun: Andreas Paulussen, Bruce Lancaster, Chad Curtis, Justin Picchi, Oliver Barker, Oliver Mattsson, Sam Wong

Conspirator: Chris Gunning, Derrick Smith, Edmund Wilfong, John Lambert, William McCormick

Dedicated to June Chapman (1930-2012)

Eden Studios • 6 Dogwood Lane • Loudonville • NY• 12211

Cover art, text, art, icons, personalities, characters, Conspiracy X™, copyright © 2013 George Vasilakos

Unisystem™ copyright © 2013 C.J. Carella.

Published under exclusive license. All rights reserved. Produced and published by Eden Studios, Inc. under exclusive license.

No part of this book may be reproduced without written permission from the publisher, except for review purposes. Any similarity to characters, situations, institutions, corporations, etc. (without satirical intent) is strictly fictional or coincidental. This book uses settings, characters, and themes of a supernatural nature. All elements, mystical and supernatural, are fictional and intended for entertainment purposes. Reader discretion is advised.

Comments and questions can be directed via the Internet at www.edenstudios.net, via e-mail at [email protected], or via letter with a self-addressed stampedenvelope.

First Printing, March 2013 Stock EDN5603 ISBN 978-1-933105-33-X Printed in the Canada (or so we are told)

Sam

ple

file

Page 4: Trust no one. - DriveThruRPG.com

TABLE OFCONTENTSCHAPTER ONE

BRIEFING 4 CHAPTER TWOTHE TRUE HISTORY

(THE WATCH)9

CHAPTER THREE AEGIS 21

CHAPTER FOURTHE NATIONAL

DEFENSEDIRECTORATE 99CHAPTER FIVE

CULTS ANDCONSPIRACIES 145

APPENDIX IAEGIS PROFESSIONS

(EXPANDED) 214APPENDIX II

CIVILIANPROFESSIONS 256

CHAPTER SIXTHE FUTURE

IS NOW 202

INDEX 270

Sam

ple

file

Page 5: Trust no one. - DriveThruRPG.com

Conspiracies vs. Secret SocietiesWithin every society are groups that have their own agendas.

Sometimes those groups are well known, but usually they arehidden in the shadows. Group members often share commonmotivations, but this is not always the case. Under pressure, a largergroup may splinter into smaller groups. It is within the context ofsecret societies that individuals look for ways to obtain information,power, control, or whatever leverage brings them closer to theirgoals. By understanding a group’s overall philosophy, it is possibleto determine what kinds of events its members are likely to becomeinvolved with and what kinds of situations will draw their attention,much like individual Cells in Aegis.

Sam

ple

file

Page 6: Trust no one. - DriveThruRPG.com

Chapter OneBriefing

Nature of ConspiraciesConspiracies provide some kind of understanding, an especially desirable idea in today’s

overwhelming information age. At its heart, a conspiracy holds together a number of paradoxes, suchas the fact that once it has done its job it no longer needs to exist. If this conspiracy is the lifebloodand paycheck of numerous individuals, they have a vested interest in insuring that new, better, anddeadlier opponents arrive on the scene.

Nuclear war constitutes the central hub of such an invisible core. The military and industrial complexaround it exists only because of the idea of such a war, but its existence also depends on avoiding thatwar. In much the same way, a religion might depend on a messiah, but the actual arrival of the messiahwould mean the religion’s end. Similarly, a counterconspiracy needs its enemy conspiracy bothpsychologically and factually to keep its coherence. It is not necessary for such a conspiracy to actuallyexist, as long as it can be perceived behind the machinations of the state to dispose of thecounterconspiracy.

Incorporating Secret SocietiesThere are many ways to introduce or include secret societies in a Conspiracy X campaign. Individual

Aegis or NDD agents may be members of secret societies with their own agendas and expectations, oran entire Cell or group may be attempting to infiltrate a secret organization to determine its intent.Entire organizations or individual group members may be used as allies, enemies, or interference.Another possibility is to run an entire campaign based around a secret organization, pursuing its owngoals and uncovering information. Obviously, other agencies and groups would prefer this informationbe kept secret, and so it is inevitable that some type of competition will develop, perhaps on a smaller,but similarly intense, scale than the Aegis-NDD struggle.

Sam

ple

file

Page 7: Trust no one. - DriveThruRPG.com

6

CONSPIRACY X • THE CONSPIRACIES SOURCEBOOK

DisclaimerThe world of �Conspiracy X� is based on historic and contemporary events, persons, and groups. The secret of a good�Conspiracy X�campaign is weaving “real” events as seamlessly as possible into the story line so that the players cannot be sure what is true andwhat is deception. Heightened paranoia is central to the experience.When this book, or any other Conspiracy X publication, uses names and details taken from history or contemporary affairs, all suchreferences are fictional or satirical. Conspiracy X is intended solely as a game and not as a source of the “truth.” Nothing in thisbook is intended to degrade or impugn these people or groups, nor does this book purport to reveal true secretive information aboutthem. In fact, Eden Studios and the authors would like to publicly disclaim any “inside” knowledge and assure any MiBs and Aegisoperatives out there that there is no reason to look into the matter any further. Honest!

CHAPTER SUMMARYChapter One: Briefing contains these opening remarks as

well as a guide to how to use this book.

Chapter Two: The True History finally reveals the historyof The Watch and the split that resulted in the creation of Aegisand the National Defense Directorate. The truth is possiblymore disturbing than initially thought.

Chapter Three: Aegis gives the Chronicler more back-ground information on Aegis benefits that their “parent Cells”can provide. This chapter also presents a detailed overview ofArea 51 and the various divisions at work at the core of theconspiracy.

Chapter Four: The National Defense Directorate pro-vides additional information on the National DefenseDirectorate or “Black Book”, allowing Cast Member NDD agentsfor Chroniclers who wish to play with the NDD as the “heroes”of the game.

Chapter Five: Cults and Conspiracies provides theChronicler with rules for creating her own conspiratorial groupsand cults, and a wealth of example organizations that can beplugged into the game.

Chapter Six: The Future Is Now introduces a new level tothe Conspiracy X setting, where the agent’s perception of thebattle for humanity may be radically altered by the extremeexperimentation of Aegis’ R&D. Who can you trust, if you can’ttrust your own mind?

Appendix The final section presents an expanded look atthe Aegis Professions presented in the core rulebook, as wellas a host of new Civilian Professions that may be used in atypical Aegis game, or even as civilian investigators into theparanormal.

HOW TO USE THIS BOOKIn a game called Conspiracy X, conspiracies are an essential

part of the world. This book provides the Chronicler with vari-ous levels of involvement. Chroniclers may use or discard anyof the information here. Some of the material presented withinthese pages could originally be found in two of the books forthe original Conspiracy X: Sub Rosa: The Conspiracy CreationSourcebook and The Hand Unseen: The Black BookSourcebook. The game stats have been modified and updatedto the new game system, Unisystem, and we have also madea few adjustments and introduced a lot of new material thatmany fans of the classic game will have heard rumors about butnever seen. The final section of this book is completely newmaterial that introduces a new level of play, where various real-ities collide. The agents will be able to perform more cinematicmoves that will be familiar to fans of The Matrix and its sequels,and will be able to experience the horrific future that awaitshumanity, leading into Conspiracy X‘s sister game Extinction.Chroniclers should feel free to use or modify anything in thischapter to enhance the game.

As this book reveals many of the secrets of the world ofConspiracy X it is designed to be purely for the Chronicler’seyes only. Some aspects, such as new Pulling Strings andResources, can be made available to Cast Members if theChronicler decides.

CONVENTIONSTEXT CONVENTIONS

This book has different graphic features that identify thetypes of information presented. This text is standard text, and itis used for general explanations.

This style is used for examples that illustrate specificrules or situations. Novice Chroniclers, those who runConspiracy X games, can look to these examples forguides on how to play.

Sam

ple

file

Page 8: Trust no one. - DriveThruRPG.com

7

B R I E F I N G1 2 3 4 5 6

DICE NOTATIONSDice are used when the outcome of an action in the

Conspiracy X game is in doubt. The Unisystem relies on fourdifferent kinds: ten-sided, eight-sided, six-sided, and four-sided.Such dice can be found in any good hobby or gaming store, andin many comic books stores. Dice are denoted by placing a “D”in front of their numerical value. Thus, a D4 indicates a four-sided die; a D8 an eight-sided die.

Ten-sided dice (D10): Used for Task/Test resolution andcertain weapon damage, D10s are the most commonly useddice. Entire game sessions can come and go without using anydice other than the D10s. They can be replaced in a very roughsense by using two six-sided dice and subtracting two from theroll (treat a result of “0” as a “1”).

Eight- and four-sided dice (D8s and D4s): In theUnisystem, these dice are used only to determine damage.

Six-sided dice (D6s): These are the most common diceavailable, easily “borrowed” from any number of easilyobtained board games. If D10s are not readily available, D6scan be used as replacements.

Multipliers are expressed after the dice notation. For exam-ple, D10 x 4 means roll one ten-sided die and multiply the resultby four. This generates a number between four and 40.

A number in parentheses after, or in the middle of, thenotation is the average roll. This number is provided for thosewho want to avoid dice rolling and just want the result. So thenotation D6 x 4(12) means that players who want to skiprolling should use the value 12. Some notations cannot pro-vide set numbers because their results depend on variablefactors. For example, D8(4) x Strength is used because theStrength value to be plugged into that notation will varydepending on who is acting.

GENDEREvery roleplaying game faces a decision about third-person

pronouns and possessives. While the male reference (he, him,his) is customarily used for both male and female, there is noquestion that it is not entirely inclusive. On the other hand, the“he or she” structure is clumsy and unattractive. In an effort to“split the difference,” this book uses male designations for evenchapters and female designations for odd chapters.

MEASUREMENTSThis book primarily uses U.S. measurements (feet, yards,

miles, pounds, etc.). Should metric equivalents be needed, thefollowing rough conversions can be used: miles can be multi-plied by 1.5 to get kilometers (instead of 1.609), meters can betreated the same as yards (instead of 1.094 yards), pounds canbe halved to get kilograms (instead of multiplied by 0.4536),and so on. If a Chronicler feels that more precision is necessary,she should take the U.S. measurements provided and applymore exact formulas.

Certain text is set off from the standard text in thismanner. This is sidebar text and it contains additional, buttangential, information or supplemental charts and tables.

Other text is set apart in this way. It details Supporting Castor Adversaries who may be used at the Chronicler’s discretion.

Sam

ple

file