- The Fourth Protocol (video game)
"The Fourth Protocol" was an
interactive fiction computer game based on the novel of the same name written byFrederick Forsyth .It was released in 1985 by Hutchinson Computer Publishing, a
subsidiary of the publishing house Hutchinson. The game was design by John Lambshead and Gordon Paterson and split into three parts. The programming was credited Electronic Pencil Company Ltd. and released for theZX Spectrum in July of that year,Commodore 64 one month later andAmstrad CPC in 1986. Large parts of the programming wasoutsource d to others:Andrew Glaister (program conversion Spectrum, parts one and two), Dave Jones (programming Spectrum, part three), Ray Owen (graphics Spectrum, part three) and John Gibbons (programming C64, part three).In addition
Ariolasoft developed a conversion for theIBM PC using CGA graphics.The game comprises three sections - "The NATO Documents", "The Bomb" and "The SAS Assault". In order to get into the last two you must use a secret code which is given to the player in the previous section. For the first time, Macintosh-like
icons were used to drive the game along. That and excellentgameplay brought it good reviews. However, the game didn't sell many copies, probably because of the, at the time, high price, and it was the only game ever released by Hutchinson.The NATO documents
The scene is Preston's office. You take the role as John Preston, the new head of Section C1(A). Somewhere in England, a burglar steals the famous Glen Diamonds, but he also finds some secret NATO documents. He alerts the MoD by sending them the documents anonymously. The Paragon Committee decides that John Preston's most important task is to find out who is leaking secrets, to whom they are being leaked and why. However, you will not be able to devote your time exclusively to this task, since many other events will be unfolding in the intelligence community which will demand your attention. "(From the instruction manual.)"
The Cencom icon offers access to your personal files where you can store information throughout the first part of the game. The Assessment icon gives you an idea of your progress, it tells you how much of the first stage you have solved and your rating at MI5. Using Surveillance you can assign 'watchers' to targets, these are snoops who provide valuable information, in addition to Memos and Reports, which will be brought to your attention via the Sitreps icon. The Calendar icon lets you know how much time has passed. The Telephone icon allows you to accept calls or call out. It is also possible to save and restore the game at any point.
The bomb
From the clues in the first part you should have an idea about the plot and who could be responsible. This part is similar in gameplay to the first part, however you are now in the field, on the trail of the
nuclear device which has been smuggled into the country.This requires additional icons to Movement, and a Manipulate icon to Take, Drop and Use objects. You are able to Look around and Examine objects. The Communicate icon allows you to talk to others, via the phone if needed.
The SAS assault
In this part you have discovered the location of the bomb. Using the information you have gathered in the previous two parts, you must work out how to defuse the device.
This part of the
trilogy requires "old fashion", textual input, and plays differently depending on the version of the game.External links
*WoS game|id=0006327|name=The Fourth Protocol
Wikimedia Foundation. 2010.