-
Connect the Dotsroll +Sharp
At the beginning of each mystery, if you look for the wider patterns that current events might be part of, roll +Sharp. On 10+: hold 3. On 7–9: hold 1. Miss: no hold. Spend hold 1-for-1 to ask: Is this person connected to current events more than they're saying? / When and where will the next critical event occur? / What does the monster want from this person? / Is this connected to previous mysteries we've investigated? / How does this mystery connect to the bigger picture?
-
Crazy Eyes
You get +1 Weird (max +3).
-
See, It All Fits Together
You can use Sharp instead of Charm when you manipulate someone.
-
Suspicious Mind
If someone lies to you, you know it.
-
Often Overlookedroll +Weird
When you act all crazy to avoid something, roll +Weird. On 10+: you're regarded as completely unthreatening and unimportant. On 7–9: pick one — unthreatening or unimportant. Miss: you draw lots (but not all) of the attention.
-
Contrary
When you seek out and receive someone's honest advice on the best course of action for you and then do something else instead, mark experience. If you do exactly the opposite of their advice, you also take +1 ongoing on any moves you make pursuing that course.
-
Net Friendsroll +Charm
You know a lot of people on the Internet. When you contact a net friend to help you with a mystery, roll +Charm. On 10+: they're available and helpful — they can fix something, break a code, hack a computer, or get you special information. On 7–9: they'll help, but it'll take time or you'll have to do part of it yourself. Miss: you burn some bridges.
-
Sneaky
When you attack from ambush, or from behind, inflict +2 harm.
- .38 revolvernormal weapon · 2-harm close reload loud
- 9mmnormal weapon · 2-harm close loud
- Hunting riflenormal weapon · 2-harm far loud
- Magnumnormal weapon · 3-harm close reload loud
- Shotgunnormal weapon · 3-harm close messy loud
- Big knifenormal weapon · 1-harm hand
- Throwing kniveshidden weapon · 1-harm close many
- Holdout pistolhidden weapon · 2-harm close loud reload
- Garrotehidden weapon · 3-harm intimate
- Watchman's flashlighthidden weapon · 1-harm hand
- Weighted gloves / brass knuckleshidden weapon · 1-harm hand
- Butterfly knife / folding knifehidden weapon · 1-harm hand
- +1 Sharpmax +3
- +1 Charmmax +2
- +1 Coolmax +2
- +1 Weirdmax +2
- Take another Flake move
- Take another Flake move
- Get a haven, like the Expert has, with two options
- Gain another option for your haven
- Take a move from another playbook
- Take a move from another playbook
- +1 to any ratingadvanced · max +3
- Change this hunter to a new typeadvanced
- Create a second hunter to play as well as this oneadvanced
- Mark two basic moves as advancedadvanced
- Mark another two basic moves as advancedadvanced
- Retire this hunter to safetyadvanced
- Get back one used Luck pointadvanced
Tell the Keeper you want to begin a hunter story. They'll weave its pressures into the campaign alongside active cases.
Mark a beat when you do something that fits it. Mark five and you gain a benefit. Beats can be earned across multiple sessions.
When the story concludes — resolved, failed, or transformed — take one resolution move. It changes John permanently.
You've been tracking a pattern — across corporate filings, university funding records, shell company registrations — that most people dismiss as noise. It's not noise. The methodology for seeing it isn't special. Anyone could do it. The problem is that most people don't look hard enough, or don't look consistently enough, or stop when the data gets uncomfortable. You didn't stop. This arc begins the first time the pattern reaches back.
When to Start This Arc
- Something John has been tracking independently shows up in an active case — without anyone having made the connection intentionally.
- John realises that a piece of information he shared casually, weeks or months ago, has since been acted on by someone he doesn't know.
- John notices he is being watched — not confronted, not warned off, just observed — by someone who clearly knows what he's been looking into.
What Is the Pattern John Has Been Tracking?
What Does John Think the Pattern Means?
This is John's working theory — it may be right, partially right, or spectacularly wrong in an interesting way:
Who Has John Told?
Story Beats — mark five to gain a benefit
- The pattern produces a result that John can verify independently — something concrete, not just correlational.
- John is actively discouraged from pursuing the pattern — not threatened, just redirected, by someone who has a reason to want him to stop.
- John's research contributes to an active case in a way the team can't explain without acknowledging he was right about something.
- John shares what he knows with someone on the team — and watches them decide what to do with it.
- The pattern reaches back: something responds to John's investigation in a way that makes clear he's been noticed.
Resolution Moves
When the arc concludes, take one — or neither.
When you first encounter a new situation, you can ask the Keeper: what conspiracy or hidden structure is this part of? The Keeper will answer honestly, within the limits of what John would actually be able to see. You've learned to trust the pattern before you understand it.
Once per session, when you uncover information someone wanted hidden, you may ask: who else knows this, and what will they do when they find out I know? The Keeper answers honestly. The knowledge doesn't make you safer — but it makes you less surprised.
You find a group hiding for good reasons. That's the surprising part. You've spent enough time looking at organisations that conceal information to know that their reasons are rarely benign — self-interest, liability, fear. This one is different. They're protecting something real. The problem is that they're also, in various ways, protecting themselves from John finding out exactly how much they know about what he's been doing.
When to Start This Arc
- John discovers that an organisation he assumed was malicious has, on close examination, been actively preventing a worse outcome — one John would care about.
- Someone John has been tracking turns out to know exactly who John is and what he's been researching, and is not hostile about it — which is somehow more unsettling.
- John finds documentation that one of PORTAL's protocols was designed to protect someone, not to control them — and that the person being protected is someone he cares about.
What Is the Benign Conspiracy Protecting?
How Does John Learn the Conspiracy Is Benign?
What Does John Do With This?
Story Beats — mark five to gain a benefit
- John discovers the benign conspiracy exists and that its purpose is genuinely protective.
- John is asked — by someone inside the conspiracy — to keep what he knows quiet, and has to decide whether to agree.
- John's earlier research inadvertently threatens to expose the benign conspiracy, and he has to choose whether to intervene.
- John shares what he knows with the team — in full, or partially, or not at all — and lives with the consequences of whichever he chose.
- The benign conspiracy asks something of John that isn't easy — and John has to decide whether to give it.
Resolution Moves
When the arc concludes, take one — or neither.
You're now a trusted contact for whoever runs the benign conspiracy. Once per session, you can ask them for help — information, a resource, a contact — and they'll provide it if they can. They may also ask something of you. The relationship is real, and so are its complications.
When you choose to conceal information to protect someone, take +1 forward to the next move you make in pursuit of that protection. You've learned that not all conspiracies are the same — and you know what distinguishes the ones worth protecting.
You've been tracking the MESA acronym across 14 shell company registrations. You're right. MESA's formation procedure creates the naming pattern as a structural byproduct — it's not intentional, but it's consistent, and it points directly at the organisation behind it. You don't know what MESA is. You just know the pattern connects. Now MESA has flagged you as a data-collection liability, and the timeline for their response is no longer open-ended.
When to Start This Arc
- John's research on the MESA pattern produces something the team cannot explain away — a concrete link between a current case and the shell company network.
- John becomes aware that something has been watching his research — not a person, an automated system — and that his access to certain data has been quietly constrained.
- MESA makes a move that John can't attribute to coincidence: something targeted that could only have happened if someone with MESA resources decided John was worth responding to.
What Does John Do With the Pattern?
What Does John Tell the Team — and When?
Story Beats — mark five to gain a benefit
- John verifies that the MESA pattern is structural, not coincidental — a moment of genuine confirmation after years of suspicion.
- MESA takes a direct action in response to John's research — something that makes clear they know who he is and what he's found.
- John tells someone on the team what he knows — in full or in part — and they have to decide what to do with it.
- John is offered something to stop — a resource, a safety guarantee, an answer to a different question — and has to decide whether it's worth taking.
- John's knowledge of the pattern produces a consequence that affects the whole team, regardless of whether that was John's intention.
Resolution Moves
When the arc concludes, take one — or neither.
John has documented everything he knows about the MESA pattern and ensured it can't be erased — distributed copies, verified sources, timestamped records. Once per session, you can produce a piece of documented evidence that's difficult to dispute. The information exists in the world now, regardless of what happens to John.
When you identify a pattern that connects current events to a larger structure, roll +Sharp. On 10+: ask the Keeper two questions from the list below. On 7–9: ask one. Miss: ask one, but you've made yourself visible in asking it. Questions: Who controls this? / What does it want? / What is it afraid of? / What is it about to do?