The Alexandrian

Deus Ex: Human RevolutionsI’ve recently been playing through Deus Ex: Human Revolution. I’ve been enjoying it so much that I’m virtually certain that there’ll be a replay of the original Deus Ex in my near future.

One of the really great features in both titles is your ability to hack dozens or hundreds of computer terminals throughout the game, revealing data – from the variety of electronic communications you eavesdrop upon – that can provide you with valuable operational intel, deeper insight into the conspiracy, and access to unique resources.

This kind of “information in depth” works wonders in terms of immersing you into the game world; it’s also a lot of fun. But replicating this kind of experience in a tabletop RPG is really difficult: Even if you don’t go so far as to prep individual handouts for every e-mail and chat log the PCs uncover, it would still require an almost insane amount of prep work in order to customize the contents of the dozens of computer terminals in a typical complex.

To solve this problem, I’ve thrown together a simple-to-prep game structure for tactical hacking. This system assumes a couple of things are generally true: First, the hacker is opportunistically targeting systems to compromise. Second, the primary goal of the hacker is to accrue information. (The structure includes some minimal support for other hacking strategies, but they’re not the primary focus of the structure.)

For the sake of simplicity, I’m going to assume a D20-style system with a single Hacking skill. But it should be fairly easy to modify these guidelines for any RPG with discrete action checks.

NETWORKS

Each network is defined by a Network Intel Table (NIT). Each entry on the NIT is a discrete piece of information with an associated difficulty class. (In practice, it looks very similar to a Gather Information table.)

Note that the term “network” is not necessarily being used in a literal sense, but rather as a convenient way of referring to multiple systems or accounts that are somehow meaningfully related to each other. (For example, the home computer of Sansasoft’s district manager may not be directly wired into the corporate infranet, but the e-mails on her computer could easily contain compromising information, so for the purposes of this system it would be considered part of the “Sansasoft Network”.)

TERMINALS

Terminals refer to any computer, cellphone, access point, or user account that the PCs can attempt to hack. Each terminal is rated with an access cap, an intel value, and a security modifier. Some terminals may also have special features.

Access Cap: The maximum DC that can be achieved on a Hacking check using that terminal. If a higher result is rolled, the excess is ignored. (For example, a hacker named Panda is using a terminal with an access cap of 15. Rolling her Hacking skill, she gets a result of 22. Despite that, the result of her check is treated as a 15.)

Intel Value: The intel value of the terminal determines the maximum number of entries that can be gleaned from the Network Intel Table.  (For example, Panda’s DC 15 result on her Hacking check is high enough to theoretically access the first six pieces of information on the Network Intel Table. But if the system she’s using only has an intel value of 2, she’ll be limited to two pieces of information.)

Security Modifier: Modifies the skill check made to hack the system. For example, a cellphone with a -4 security modifier applies a -4 penalty to a hacker’s skill check.

TERMINAL SPECIAL FEATURES

These special features (and any others you can imagine) can be added to any terminal. In fact, a single terminal might have several special features.

Communications Control: The terminal allows monitoring and/or control of local communication channels.

Data Tunnel: A data tunnel connects one terminal to another terminal. Each data tunnel is rated with a DC. With a successful Hacking check, a hacker can use the data tunnel to access the remote terminal. Some data tunnels might also grant bonuses when attempting to hack the remote terminal they link to.

High-Value Content: A high-value system grants a bonus to the hacker’s highest result on the Network Intel Table to date. (The more valuable the system, the higher the bonus.)

Specific Content: Although the point of this tactical hacking system is generally to avoid coding specific information to specific systems, in some circumstances it may still be valuable to do so. Specific content could also refer to security maps, data network maps, or other mission-valuable intel.

Systems Control: The terminal can be used to control surveillance cameras, robots, gun turrets, environmental controls, navigation systems, or any number of other “real world” systems.

PREP LIST

For the purposes of tactical hacking, think of each “network” as a body of related information. Each terminal on the network is a system or account which either houses part of that body of information or has access to it. It is assumed that there are a multitude of ways to discover each piece of information in the network. (For example, a hacker could discover Sansasoft’s illegal digital smuggling by reading compromising e-mails; performing forensic examinations on black book budgets; decrypting incriminating communication intercepts; discovering off-book shipping manifests; or any number of other possibilities.) If a piece of information can really only be discovered in a specific way, then that’s specific content that should be keyed as a special feature to a particular terminal.

When prepping a network for tactical hacking, you first need to prep the Network Intel Table. Here’s a sample:

DCSansasoft Network Intel
10Sansasoft has recently been negotiating a lot of high-value contracts with GigaGlass, a Russian manufacturer of augmented reality specs. (Statistical survey of sales invoices.)
10The master override code for the doors in Building A is 5226. (Briefing packet for employee temporarily transferred from a different office.)
15There have been repeated complaints regarding the quality of goods and services provided by a company called GigaGlass. Despite the problems, Sansasoft has been increasing the volume of their business with GigaGlass. (Internal memos to and from COO Deidre Brooks.)
18Motion detectors have recently been installed in the prototyping labs on the third floor. (Billing dispute recorded in e-mails exchanged with the accounting department.)
20VIP travel arrangements were recently made for a group of executives from the Marilyn Corporation. (Travel records filed by an administrative assistant named Leticia Moray.)
24A keylogging worm was disseminated onto the network by a disgruntled former employee. Identifying and cleaning every system that’s been infected has proven difficult. (Detecting and exploiting the keylogger on an infected system. 1 in 4 chance of a terminal being infected; grants +1 intel value and +4 bonus to Hacking checks made on that system.)
25Massive quantities of encrypted data are being streamed from Sansasoft-sourced GigaGlass augmented reality specs to servers being rented from the Marilyn Corporation. (Network traffic logs.)
28There used to be a fireplace on the 8th floor. It was drywalled up in a remodel eight years ago, but its chimney would have run right past the executive suite of CEO Erik Balley on the top floor. (Approval blueprints from the remodel.)
30Sansasoft CEO Erik Bally has recently requested that all copies – including backup copies – of e-mails sent from his office on April 30th be destroyed. Local copies have been purged, but it’s possible copies might still be found in the offline backups kept in their Sacramento offices. (E-mails from IT security.)

(I’ve included a potential explanation for how the hacker could access each piece of information. You could expand on that by creating full handouts for each piece of information; or you could skip that and just improvise the details during play.)

Second, you need to prep a list of the terminals on the network. (Such a list could also easily be integrated into a location key or other reference as appropriate.) For example, you might stat up the customer service terminals at Sansasoft like this:

CS Terminals (access cap 15, intel value 1, security modifier +0): There is a 1 in 10 chance that any given customer service terminal will instead have no access cap (due to an unusually compromising internal e-mail). Otherwise, hackers can gain no more than 3 pieces of intel in total from all customer service terminals.

RUNNING THE SYSTEM

When a PC wants to hack a terminal, follow these steps:

(1)   The character makes a Hacking check.

(2)   Modify the check by the terminal’s security modifier.

(3)   Check to see if the terminal’s access cap applies and reduce the effective check result if necessary.

(4)   Use the character’s effective check result to determine the number of previously unrevealed pieces of information they can discover. If this number is larger than the terminal’s intel value, randomly determine which pieces of intel they receive.

Alternatively, you could randomly determine between all possible pieces of intel (which could result in them learning nothing new due to duplication from previous efforts).

Go to Part 2: Tools for Tactical Hacking

True roleplaying — in which you pervasively portray and deeply immerse yourself into a character who is not yourself — is a difficult art. There are people who literally spend years studying and mastering improvisational acting. And quite a few of those people would look at the challenge of performing at a dining room table while simultaneously rolling dice to be a very high hurdle to clear.

On the other hand, I’m not a big fan of drenching this sort of thing in mystique. Plus, even untrained high school students can climb up on stage and perform. Just because you can’t consistently produce material like Matt Damon does in Saving Private Ryan (the entire story of his brothers was improvised) doesn’t mean you should just throw in the towel.

With that being said, I usually don’t worry too much about this on Day One with new players: If they want to play an avatar of themselves, no problem. If they want more than that, then a properly constructed set of rules, the example of other players, and their own creativity will lead them into it.

But when you come to second day of roleplaying, you might want to reach for something a little more daring. And that’s when you might discover that capturing the totality of a personality which isn’t yours can be a daunting task. It may seem too immense or you may not know where to begin. Even if you do manage to get a grip on the character, it can be easy for it to slip away once you actually start playing the game (and that can be really frustrating).

When that happens, this is my advice: Instead of jumping into the deep end and getting overwhelmed, start with a small, concrete checklist of “touchstones” that you can use to connect with your character.

Pick three touchstones. Focus on those.

For example:

  1. Pick a single personality trait. (Think of it in concise terms, but you may benefit from not making it completely generic. For example, instead of just saying “greedy”, you might say “greedy, but will always give a coin to a child in need”. Focus on finding opportunities when you can make active choices based on that personality trait. Also focus on never acting contrary to that personality trait.)
  2. Pick a physical mannerism. (This shouldn’t be flamboyant and it doesn’t have to be particularly fancy or complicated. In fact, the simpler the better. Something like “he drums his fingers” or “he scowls when he has to think hard about something” or “he likes to wink while giving a thumb’s up”.)
  3. Create a catch-phrase. (It doesn’t necessarily have to be a specific phrase (which could easily get worn out and boring), but perhaps make it some core concept. For example, Conan often swears to Crom. He doesn’t do it all the time and it often takes different forms, but it’s a persistent element of his character. As a bard, you could pick some famous songwriter or storyteller who inspires you.)

While keeping those touchstones in mind, just keep doing what you’re doing now. But whenever it’s appropriate, hit one of those touchstones: Drum your fingers on the table. Or demand the choicest share of treasure. Or mention that “a beast like this was described in the song s of the legendary bard Moranth”.

Of course, don’t feel as if your character has to be limited to those things. But these are your touchstones: Focus on achieving them and let the rest take care of itself for awhile.

It won’t be long before you start to feel the character “settle in” around those touchstones. Over time, the character will become deeper and richer. But whenever you feel the character “slipping away” again, simply reach for one of your touchstones to find your way back.

Go to Part 1

As a final rumination on the subject of game structures, I want to discuss player-known and player-unknown game structures and the differences between the two in actual play.

Let me demonstrate what I’m talking about by way of example.

THE UNKNOWN HEX

In the earliest hexcrawling structures, the players were supposed to be aware of the hexes. Volume 3: The Underworld & Wilderness Adventures for OD&D, for example, reads, “When players venture into this area they should have a blank hexagon map, and as they move over each hex the referee will inform them as to what kind of terrain is in that hex.”

In designing the structure I use for hexcrawling, on the other hand, I specifically eschewed this approach: Although I found the abstraction of the hex map useful in many ways, I didn’t want the players to directly interface with that abstraction. Instead, I wanted them to interact with the game world.

So while I used the abstraction of the hex map for its convenience in mapping and keying, my players had to figure out how to navigate the world purely from the view point of their characters.

The original version of hexcrawling is a player-known game structure: They can see, understand, and even manipulate the game structure that you’re using to represent the game world. Most combat systems are another excellent example of player-known game structures.

My version of hexcrawling is a player-unknown game structure: They perceive only the game world and don’t know exactly what structures you’re using to prep and run that world. Another common example of a player-unknown game structure are random encounters: Did they run into goblins in that hallway because the encounter was keyed there or because the GM rolled a random encounter?

USING PLAYER-UNKNOWN STRUCTURES

My decision to obfuscate my hexcrawling procedures is not unusual for me. As a GM, I’m generally trying to find simple methods of organizing my prep work so that it can be easily and efficiently referenced and used during play. But I don’t necessarily want my players to see the structure that I use: I want them to see the messy, chaotic world that their characters live in.

The method I refer to a “The Second Track” in Advanced Node-Based Design is an example of this: I organize two distinct and easy-to-manage groups of nodes, but then I mix them together in play to create a more complex reality.

I discussed another example as “Minor Elevation Shifts” as part of the Xandering Techniques: “When the PCs come to a staircase they may naturally assume that they are going up or down to a new level of the dungeon. But by including minor elevation shifts within the topography of a single dungeon level you can confound their expectations … These techniques aren’t just a matter of confusing the players’ mapping. You are disrupting their ability to intuit the organization of your maps by analyzing the reality of the game world. While maintaining clean and simple maps for your own use and reference, you are creating a world that not only seems more dynamic and complex, but actually is more dynamic and complex.”

More generally, if the players don’t know the structure you’re using then they can’t engage the structure: Instead, they have to propose actions in-character.

See if you can imagine for a moment what combat would be like if the players had no idea what the underlying structure of the game was. I don’t just mean a scenario in which the GM is keeping their hit point totals secret from them: I mean that the players don’t know what rounds are; they don’t know what attack rolls are; they don’t know what hit points are. What effect would that have on how combat is experienced at the game table?

On a similar note, running a new game structure in a player-unknown configuration can be a great method for diagnosing inadequacies, shortcomings, and dissociations in the structure. If you come to your players and say, “Here’s a system for Gee-Whizzing and it has rules for A, B, and C.” Then your players may focus exclusively on the options that have been presented to them.

But if you just come to your players and say, “Let’s do some Gee-Whizzing.” Then your players will be free to propose any action that occurs to them: If they stick to A, B, and C then you’ve done your job well. If they’re proposing D, E, F, and G then you’ve got some holes to fill.

Similarly, if you find that your structure keeps expecting the players to make decisions that they aren’t making (or that they can’t make without being aware of the structure), then that’s a huge tip-off that your structure is dissociated.

USING PLAYER-KNOWN STRUCTURES

This is not to say, however, that player-unknown structures are the be-all and end-all of gaming. On the other end of the spectrum, player-known structures are specifically useful because they allow players to make decisions informed by the game structures in play.

In my hexcrawling structure, for example, players must select their mode of travel: Normal, Hustling, Cautious, or Exploring.

(Normal movement has no modifiers. Hustling increases navigation DCs. Cautious movement is made at ¾ normal speed, navigation DCs are decreased, and the chance for non-exploratory encounters is halved. Finally, while exploring, characters move at ½ normal speed and the chance for encounters is doubled.)

For roughly a dozen sessions or so, I kept this structure hidden from the players: Instead, I applied the appropriate mode of travel based on the actions they proposed. (For example, if they said that they were going to start moving carefully through the woods in order to avoid encountering any of the orc warbands they knew were looking for them, then I would slot them into the “cautious” mode of travel.)

Eventually, however, I concluded that it made more sense to make this a player-known structure: First, because the players were assuming – in the absence of additional information – that these types of decisions were irrelevant in the game structure I was using. (And because of this false intuition of the game structure, they stopped feeding me the cues I was using to assign modes of travel.) Second, because choosing a mode of travel had a significant impact on the efficacy of navigation in the system. (Hiding this structure from them actually made them less competent than their characters.)

You can see a similar principle in the familiar debate of whether or not GMs should tell their players the target number for an action check.  (My opinion is that you should only obfuscate the target number if that obfuscation mirrors a lack of information on the part of the character. Otherwise, providing the DC is the quickest way to overcome the vast difference in bandwidth between the character’s perception of the world around them and the player’s perception of that world. For example, a character standing in front of a chasm can actually see the chasm. The player, on the other hand, is completely dependent on a very narrow band of audio communication from the GM.)

But I digress.

As a final point of consideration in player-known structures, consider the Point of First Contact in that structure. As described in an essay at D-Constructions:

For better or for worse, most RPGs have freeform moments and structured moments, and it’s a really good idea to think about how the latter start. […]

The first die does get a lot of focus in play because it’s the break moment. It’s the moment you start concentrating and reach for your first contact with the rules. So it pops up in your mind and yells “THIS IS IMPORTANT”. To an extent, therefore, it doesn’t matter what your CORE mechanic is because your first gets more attention. […]

 

It’s worthwhile, therefore, to make sure your first contact IS important to the kind of game you want to run. In Smallville your first die is your value – what you believe in, why you care about this struggle at all. In Marvel it’s what kind of team you’re in – are you the kind of person who performs better in a team, with a buddy, or solo. Right way we have something central to Marvel’s enduring dynamic.

 

What’s your first point of contact? In every sense?

IN CONCLUSION

This has been a very long series of essays. It’s touched on a lot of different subjects (which is perhaps unsurprising, given that the topic is one that lies at the heart of virtually every moment at your gaming table). But if you gain absolutely nothing else from it, I hope you can take away two important points:

First, I think a lot of the linear, railroaded scenarios that we see in roleplaying games are the result of GMs who have a limited (or nonexistent) toolset. Often I think GMs don’t even realize that these types of tools exist. But they do exist and there’s nothing complex or mysterious about them. Once you know they exist, they’re not even particularly difficult to master.

Second, if you’re a GM, I think you’ll benefit greatly from consciously thinking about the game structures you’re using: Innovate. Experiment. Create. Share. Playtest.

One of the most exciting thing about the Old School Renaissance for me has been its role in rediscovering highly effective game structures that had largely been forgotten by the mainstream gaming community. Over the past few years, we’ve seen how much fresh creativity and original gameplay can be generated out of tapping a robust game structure like hexcrawling that has lain dormant for years.

But I think that’s barely scratching the surface. If we can get stuff like Carcosa and Points of Light and Kingmaker out of hexcrawling, what else have we been missing out on?

Game structures are merely ornately-wrought keys. The really interesting stuff is what lies beyond the doors those keys will unlock.

FURTHER READING
Hexcrawls
Thinking About Urbancrawls
Gamemastery 101
Game Structures – Addendum: Katanas & Trenchcoats

Go to Part 1

The first RPGs had unique game structures for just about everything. In the original edition of D&D, for example, evading monsters in the dungeon had one mechanical structure and the process for evading monsters in the wilderness had a completely different structure. The earliest designers, when confronted with the need to resolve the outcome of a new situation, would simply create entirely new mechanics and new paradigms to handle it.

This didn’t last long: Systems that had worked well in the past got repurposed. Similar systems had their redundancies conflated away. Even more importantly, GMs looking to adjudicate unanticipated actions were quick to develop consistent methodologies. (“When you wanted to do X, we did Y. Now you want to do something that’s kind of like X, so we’ll use Y again.”) And this very rapidly evolved into the first universal, generic mechanic: Rolling either 3d6 or 1d20 and comparing it to the character’s ability score.

Shortly thereafter, the idea of modifying these rolls using character skills appeared. These modifications mutated rapidly and then generally settled into the system of “ability score + skill modifier” that has basically dominated RPG mechanics for the past three decades.

The advantage of having a generic, universal mechanic is that it provides the GM with a robust tool for making rulings at the table. With a properly comprehensive skill list, for example, making a ruling for the resolution of any discrete action is simply a matter of selecting the appropriate skill.

(By contrast, the process of making a ruling in many early RPGs often involved first inventing the tools. It wasn’t unusual to literally invent entire dice mechanics from scratch. It’s unsurprising that GMs in these systems almost reflexively create universal mechanics as quickly as possible.)

This is obviously good for the GM (for the same reason that carpenters like to have a toolbox instead of needing to reinvent the hammer for every new project), but it’s also good for the players: It creates a flexible environment in which any discrete action can be attempted within the structure of the game mechanics. This means that any action can be proposed without bogging the session down; it also means that there is no structural bias for or against any type of action. (There may still be a mechanical bias, of course, if certain actions are easier than alternatives, but that’s a separate issue.)

(When I say “structural bias” I’m referring to the fact that gameplay generally gravitates towards existing game structures. I’ve talked about this a couple times previously: If there’s a system for prospecting gems, for example, players are more likely to go prospecting. If a game includes a robust system for resolving riddle contests but has no mechanics for resolving combat, it’s likely that the game will see a lot more riddling with words than it will riddling with bullets.)

GENERIC SCENARIO STRUCTURES

If a generic, universal action resolution mechanic is useful, it’s not hard to see how much more useful a generic, universal scenario structure would be. With a tool like that, GMs could seamlessly transition their campaigns to be virtually anything and it would all be as robust, entertaining, and rewarding as a dungeoncrawl or a combat encounter.

Unsurprisingly, therefore, the history of the industry is studded with efforts to expand the generic, universal mechanic to include larger structures at both micro- and macro-levels. Many of these efforts have historically been little more than crude guidelines, often fumbling in the dark towards an objective that has been poorly understood. Others, however, have attempted to create more comprehensive and defined structures.

In recent years, the best-known example of this sort of thing has almost certainly been D&D 4th Edition’s skill challenges.

And, unfortunately, skill challenges show all the characteristic failures typical of these systems: Dissociated mechanics (including emergent dissociated properties). A systemic blandness that often results in fundamental gameplay which is “not fun”. A prevention of meaningful choices by the players (or an outright forbiddance of such choices). And so forth.

In Part 11 I listed six properties of effective game structures:

  1. They should be flexible (allowing players to make decisions not constrained by the structure).
  2. They should have a capacity for meaningful decisions.
  3. They should allow players to make decisions which are associated and in-character.
  4. The default actions of the structure should be tied to the reward structures of the game.
  5. They should be fun.
  6. They should be easy to prep.

And while skill challenges satisfy some of these criteria (more or less depending on exactly which version of the skill challenge rules you’re actually using), they obviously fail to fulfill most of them (and arguably the most important ones).

Most of these problems seem to crop up due to the lack of specificity inherent in a generic structure. For example, while it’s possible to break almost any activity down into an abstract “action” which can be resolved with a generic skill check, the procedural and structural differences between, for example, negotiating a peace treaty, safely traversing a haunted forest, or prospecting for gems seem to defy a generic approach. And when such a generic approach is attempted, the result usually dissociates itself as the mechanical decisions divorce themselves from the decisions being made by the characters in those unique situations.

On the other hand, while Eurogames prove that abstract mechanical representations can still provide fundamentally fun gameplay, efforts to solve the dissociative problems with generic scenario structures tend to emphasize flat, bland mechanics that strive to be as “vanilla” as possible. And that results in gameplay which is mechanically boring.

Historically, this appears to be an insoluble balancing act: The more “interest” you add to the mechanics, the more specific they become and the stronger they dissociate from the game world. The more generic you make the mechanics, the blander and more boring they become. (Nor does there seem much success in solving fully for one or the other: Making the mechanics less specific seems to solve some problems of dissociation, but simultaneously introduces others.)

THE HOLY GRAIL

This would be an appropriate time for me to announce a dramatic cutting of this Gordian knot, unveiling an incredible generic scenario structure that would revolutionize your gaming table.

Sadly, however, this is not to be.

A truly successful, fun, and effective generic scenario structure would be the holy grail of roleplaying games. But, much like the holy grail, it may also be an unattainable prize.

On the other hand, at this time last year, I would have said that even generic structures at a level of complexity comparable to combat (i.e., generic structures for resolving conflicts in multiple steps) had largely failed. But as I recently discussed, Technoir has achieved a remarkable success in accomplishing exactly that (albeit in a form which I haven’t figured out how to reverse engineer successfully into other RPGs yet).

So there may be some breakthroughs lurking out there; just waiting for the right time and the right circumstances to emerge. Unfortunately, I won’t be the one to bring them into the limelight. (At least not today.)

I suspect that at least part of the problem with achieving these breakthroughs, however, is that our current range of robust, fully-developed scenario structures is so dreadfully limited in its scope and variety: If all you’ve seen is an apple and a couple of pears, it would be difficult to reverse engineer what the generic definition of “fruit” should be.

Personally, I think it would be great if we started seeing more unique, fully-developed scenario structures in the hobby and industry. It’s something that’s been consuming more and more of my own time (as this series of essays might suggest), and I think that broad experimentation in this area will begin to open up possibilities for dynamic gameplay that we can’t even really begin to imagine today. (Particularly as these robust scenario structures are mastered and recombined.)

Go to Part 16: Player-Known and Unknown Scenario Structures

Tagline: With Atlas acquiring the rights to Feng Shui let’s take a look at one of the old-school supplements.

Feng Shui: Marked for Death - Daedalus EntertainmentAs this review is being written I have just received news that Atlas Games has acquired the rights to the core Feng Shui rulebook, virtually guaranteeing a re-release of one of the best RPGs ever created. I thought I’d review a couple of old sourcebooks for the game (this one and also Back for Seconds) as a form of mild celebration. Although Atlas hasn’t negotiated the rights to these supplements, I figured what the hell. You should be able to find some of these in a used box somewhere.

Marked for Death is a collection of five adventures for the Feng Shui game – one written by each of the authors. It’s a pretty impressive credit list, with some of the really great creators in this industry taking part – demonstrating that the pure action-packed fun of this game attracted the best of the best. The results don’t disappoint, although it’s always been difficult to get really excited about a set of disjointed adventures. In a lot of ways I feel like I’ve picked up a themed issue of Dungeon magazine instead of a supplement.

As always this review is prefaced by the notice that these are a set of modules. The plots will be discussed as part of the reviews and players should avoid reading this review if they feel that their GM might end up using any of these in the course of their game.

In any case these adventures are really quite excellent. They are also well-balanced, taking advantage of almost all the available facets of the Feng Shui mythos to one degree or another and ranging in complexity from basic introductory to exceptionally complicated.

The first adventured, “Brinks”, written by Bruce Baugh, gets the PCs involved in a bank robbery which is really just a cover for the seizure of a highly potent feng shui site. Very basic, very simple, very good.

In “Blood for the Master”, by Greg Stolze, the PCs are drawn into one of the great staples of HK action flicks – a gang trying to terrorize a neighborhood into submission. The twist? The gang is terrorizing the neighborhood because a demonic temple is about to materialize. The PCs’ mission? Kick demon butt.

“Pai Lai”, by Chris Pramas, takes the PCs into Feng Shui’s future where they are asked to help free a site from Buro control. Unfortunately they get screwed over (welcome to Feng Shui) and a Jammer tries to doublecross them and destroy the site. Oh, did I mention the ancient demon lord that gets freed? Well, there’s this ancient demon lord….

John Tynes really shows off in “The Shape of Guilt”, weaving a complicated political tale in the Netherworld. Tynes describes it as “Hamlet meets The Heroic Trio” – and that’s not the half of it. I’d tell you more, but I don’t want to spoil the fun; plus trying to untangle this twisted web is practically impossible without overwhelming this review. You’ll like it. Trust me.

Finally Allen Varney takes on the challenge presented by “The Shape of Guilt” and succeeds in crafting an even better story with “Shaolin Heartbreak”. This expertly crafted adventure may be a little bit difficult to work into a campaign, but if you take the time and effort to do so you won’t be disappointed. The basic summary: A monk from 1850 travels into the present to save the warrior woman he loves (naturally against the taboos of his religion) from an evil magician. Natually (this is a Hong Kong action flick after all) this warrior woman is a dead ringer for a celebrity that the PCs have become involved with. Fun and mayhem result.

This book is a fun read even if you don’t get the chance to play through the adventures. It’s relatively cheap and I don’t think you can go wrong by taking a look at it.

Style: 4
Substance: 3

Writers: Bruce A. Baugh, Chris Pramas, Greg Stolze, John Tynes, and Allen Varney
Publisher: Daedalus Entertainment, Inc.
Price: $12.95
Page Count: 78
ISBN: 1-888335-01-7

Originally Posted: 1999/04/13

For an explanation of where these reviews came from and why you can no longer find them at RPGNet, click here.


JUSTIN ALEXANDER About - Bibliography
Acting Resume

ROLEPLAYING GAMES Gamemastery 101
RPG Scenarios
RPG Cheat Sheets
RPG Miscellaneous
Dungeons & Dragons
Ptolus: Shadow of the Spire

Alexandrian Auxiliary
Check These Out
Essays
Other Games
Reviews
Shakespeare Sunday
Thoughts of the Day
Videos

Patrons
Open Game License

BlueskyMastodonTwitter

Archives

Recent Posts

Recent Comments

Copyright © The Alexandrian. All rights reserved.