Advanced Intelligence Surveillance Agency

Play Advanced Intelligence Surveillance Agency
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Introduction: Advanced Intelligence Surveillance Agency(AISA) is a surveillance system building game. You will control an intelligence surveillance agency, you will need to achieve mission goals by establishing the surveillance system in the city. A news system will be provided in the game to provide players with the latest mission information. You can customize your equipment according to your needs in the Research center, including surveillance probes, surveillance drones, large reconnaissance drones, etc, and you can choose the way to complete the task according to the current intelligence. The location of the surveillance system you deploy, the detection range of the surveillance system, the efficiency of eliminating threats, and the casualties of civilians will all affect the success probability of your mission. Every action you take may have different effects.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

> Initiating foreign territory surveillance program
> Protocol 'AISAS-984XN'

> Get main objectives:
-- Establish surveillance network
-- Search and Eliminate threats

> Administrator detected
> Initiating 'Briefing' protocol
> Welcome to Advanced Intelligence Surveillance Agency (AISA)
-- AISA is an intelligence surveillance agency approved by the Foreign Territory Land Monitoring Act, which is subordinate to the Ministry of National Defense.
-- AISA is mainly responsible for the detection and elimination of terrorist activities in overseas territories and cities.
-- The surveillance plan will allow administrators to place surveillance equipment anywhere in the city.
-- Any individual entering the surveillance area will be scanned by the surveillance equipment and obtain personal information.
-- If the surveillance device locates the threat, the administrator will be asked to take action.
-- Administrators will be authorized to use equipment including military detectors, drones, and electronic warfare weapons.
-- The administrator will be able to customize the equipment research plan according to the needs.

> Authorizing the deployment of surveillance equipment
> Authorized. Monitoring equipment is now free to deploy in the city

> System diagnosing:
-- Command center ready
-- Research center ready
-- Operation center ready
-- Black Ops center offline

> Bypassing local reinforcement security network
> Succeed

> Requesting citizens information
> Completed

> Inquiry parallel projects status:
-- PRISM (Decoy)
-- Upstream Collection (Decoy)
-- ECHELON (Activated)

> Gathering Intelligence from base stations
...
...
...
...
> Access denied, additional equipment required

> Initiate program complete
> Waiting for commands
Play Tutorial
Available on devices:
  • Windows

Discover

You may also like...