Oracle - Twists (d36)

d36 Result

1

The Asset is a low-level patsy; the true purchaser is a neutral third-party government ally.

2

The Handler used this exact dangerous scenario 10 years ago—it failed and caused an international scandal.

3

The mission is designed to fail publicly to provoke a hardline political response from an antagonistic department.

4

The Enemy Service has tipped off a hostile local authority that a foreign agent is operating on their turf.

5

The decoy item is marked with a signature that ties it directly to a non-existent military project of the Agent's nation.

6

The Agent discovers they were given this mission to keep them away from a more embarrassing, ongoing investigation in the home service.

7

The Asset is an unregistered operative of a friendly, allied service, and the Agent is unknowingly burning them.

8

The Handler/Ally accidentally exposed the operation to a mole in a moment of carelessness.

9

The Directorate is running the Enemy Handler as a triple agent, and the current operation is a loyalty test.

10

The main Enemy Handler is actually a deep-cover mole for the Agent's service, and this is their final exfiltration mission.

11

The secured location has been recently tampered with by the Asset, who suspects a different counter-intelligence service is after them.

12

The Agent recognises one of the security personnel as a former close friend who now believes the Agent left them for dead years ago.

13

The Asset's motivation is purely to fund humanitarian aid locally, not ideological or criminal gain.

14

The Ally's support is conditional on the Agent performing an unethical favour for them later (e.g., character assassination).

15

The equipment supplied by Technical Division contains a lethal contaminant that will later harm the recipient.

16

The Enemy's security relies on the use of innocent civilian cover (e.g., a family restaurant) forcing the Agent to compromise bystanders.

17

The only safe exit involves compromising a high-ranking local religious figure who is using the compound as sanctuary.

18

The Agent must destroy a single, sentimental item belonging to the Target to make the operation look complete.

19

The Target is currently impersonating a low-ranking subordinate; the real target is hidden nearby.

20

The Ally's identity is already known to the enemy, and their communications are being perfectly monitored.

21

The Agent discovers they are on a 'neutralisation list' prepared by a disillusioned section of the Service.

22

The Enemy Handler is using the exact codename and cover identity of a former friend of the Agent who was killed.

23

The Agent's best disguise/cover ID belongs to a famous, recognised historical figure in the city.

24

The Agent's current cover ID documents contain a forged signature from a family member they cut ties with years ago.

25

The Asset is deliberately leading the Agent into a surveillance net set up by local security.

26

The Handler/Ally has secretly placed a tracer on the Agent, viewing them as a potential liability.

27

The Agent's next extraction is a trap—The Service has decided the Agent's record is too dangerous and must be permanently retired.

28

The Enemy Handler realises the planned deception and forces the Agent to work for them to secure their original objective.

29

The Agent realises their escape route has been mined with low-grade explosives (as a contingency by The Service).

30

The Agent discovers the Target is actually their long-lost relative working under deep cover for an unknown side.

31

The critical item is not intelligence, but proof of corporate corruption tied to Western powers.

32

The Ally's true goal is to discredit a rival Director by ensuring the mission fails spectacularly.

33

The mission's real goal is to identify a lower-ranking relative of the Target, who is the true recruitment objective.

34

The Enemy is testing the Agent's Service; the critical item is a dummy package meant to locate the Agent's listening post.

35

The successful execution of the swap is irrelevant; the mission is to see who replaces the main security element after the breach.

36

The mission is a loyalty test run by the Agent's Handler to assess their post-crisis stability.