Story/Plot Summary
Welcome, operative. This section details the overarching narrative of Tom Clancy's Splinter Cell: Chaos Theory, providing a comprehensive breakdown of each mission's objectives and how they tie into the larger geopolitical conflict. Understanding the 'why' behind your actions is crucial for effective infiltration. We'll guide you through the intricate web of cyber warfare, international espionage, and the looming threat of a global conflict.
The Lighthouse: A Prelude to Chaos
The game opens with a seemingly isolated incident: the disappearance of American programmer Bruce Morgenholt, working on a new encryption algorithm, and the sinking of the USS Clarence E. Walsh off the coast of Peru. Sam Fisher is deployed to the Lighthouse in Peru to investigate. Your primary objective here is to locate Morgenholt and determine the cause of the Walsh's sinking.
- Initial Infiltration: Begin by rappelling down the cliff face. Silence the two patrolling guards near the base of the lighthouse.
- Locating Morgenholt: Navigate the interior of the lighthouse, using shadows and stealth to avoid detection. You'll find Morgenholt's body in the control room on the upper levels, confirming his demise.
- Data Retrieval: Access the computer terminal in the control room to download critical data regarding Morgenholt's research and the events leading to the Walsh's destruction. This data reveals a sophisticated cyber-attack, hinting at a larger conspiracy.
- Exfiltration: Proceed to the designated extraction point, typically a waiting boat at the base of the lighthouse, after securing all objectives.
Panama: Unraveling the Cyber-Attack
Following the Lighthouse mission, intelligence points to a sophisticated cyber-attack originating from a Panamanian bank. Sam is tasked with infiltrating the Panama Bank to identify the perpetrators and gather more information on the "Information Warfare" threat.
- Bank Infiltration: Enter the bank through a ventilation shaft or a less-guarded side entrance. Be mindful of laser grids and security cameras. Use your Optical Cable to scout ahead.
- Data Acquisition: Your main goal is to access the bank's central server room. This often involves bypassing multiple security checkpoints and disabling alarm systems. Look for keycards dropped by guards or accessible from their bodies after a non-lethal takedown.
- Identifying the Source: Once in the server room, hack the main server to download financial records and communication logs. This data will reveal connections to a Japanese information technology company, Displace International, and its CEO, Douglas Shetland.
- Eavesdropping: You may encounter a critical conversation between bank officials and unknown parties. Use your Directional Microphone to listen in from a safe distance for additional intel.
New York: The Displace International Connection
The trail leads to Displace International's New York headquarters. Sam must infiltrate the heavily guarded building to gather evidence linking Displace to the cyber-attacks and to investigate Douglas Shetland directly.
- Building Entry: Consider a rooftop insertion via a ventilation shaft or a ground-level approach through a less-patrolled loading dock.
- Locating Shetland's Office: Navigate the corporate offices, avoiding security patrols and laser grids. Shetland's office is usually on an upper floor, requiring elevator access or careful climbing.
- Evidence Collection: Inside Shetland's office, search for his personal computer and any physical documents that could incriminate him. You might need to use your EMP Grenades to temporarily disable electronic locks or cameras.
- Interrogating Key Personnel: You may have an opportunity to interrogate a high-ranking Displace employee for crucial passwords or access codes. Remember, non-lethal methods are preferred for higher scores.
Hokkaido: The Japanese Connection Deepens
With evidence pointing to Japan, Sam is deployed to a Japanese bathhouse and resort in Hokkaido, a known meeting point for high-profile individuals connected to Displace. The objective is to gather intel on a new weapon system and its potential buyers.
- Stealthy Approach: The bathhouse is a public area, making overt aggression highly detrimental. use the environment, including steam and crowded areas, for cover.
- Surveillance: Your primary task is to observe and record conversations. Use your Optic Cable under doors or your Directional Microphone from adjacent rooms to capture vital discussions.
- Weapon System Intel: Look for schematics or prototypes of the new weapon system, often located in a secure back room or laboratory within the complex.
- Identifying Contacts: Pay close attention to who is meeting whom. This mission is crucial for identifying the key players in the unfolding conspiracy.
Seoul: Escalation and Betrayal
The situation escalates dramatically in Seoul, South Korea, as a full-scale information war erupts. North Korea launches cyber-attacks against South Korea, seemingly orchestrated by a third party. Sam must prevent a full-blown military conflict.
- Preventing War: Your immediate goal is to stop the flow of disinformation and prevent a retaliatory strike. This involves infiltrating various communication hubs and disabling their systems.
- Locating the Source: Intelligence suggests the attacks are being coordinated from a specific location. You'll need to pinpoint this location, often a hidden bunker or a fortified building.
- Confronting Shetland: This mission often culminates in a direct confrontation with Douglas Shetland, who reveals his true motives and the extent of his involvement. You'll need to make a critical decision regarding his fate.
- Disabling the Weapon: The ultimate objective is to disable the "Mass Destruction Weapon" – a sophisticated cyber-weapon capable of crippling global infrastructure. This requires accessing its control systems and initiating a shutdown sequence.
The Final Act: Global Stability at Stake
The final missions involve a desperate race against time to prevent a global catastrophe. Sam must neutralize the remaining threats and expose the true masterminds behind the chaos. This often involves infiltrating highly secure facilities and confronting the ultimate antagonist.
- Target Neutralization: Identify and neutralize the individuals responsible for orchestrating the global information war. This may involve a direct assault or a more subtle infiltration to capture them alive for interrogation.
- Data Exposure: Gather irrefutable evidence to expose the conspiracy to the world, preventing future attempts at destabilization. This could involve uploading critical data to a secure server or transmitting it to friendly intelligence agencies.
- Securing the Future: The ultimate success of the mission lies in restoring global stability and preventing the "Chaos Theory" from becoming a reality.