You are on page 1of 5

Terrorist Takedown 2 US Navy Seals Game Manual Table of Contents 1. Getting Started 1.1. System Requirements 1.2.

Installing the Game 1.3. GameSpy Comrade 1.4. Support 1.5. Bonus Game 2. Playing the Game 2.1. Main Menu 2.2. Getting into the Action 2.3. Controls 2.4. Multiplayer Mode 3. Game Story 3.1. Operation Cerberus 3.2. Intel Update: Situation on the Ground Copyrights 2007 City Interactive S.A., all rights reserved. Published by City Interactive S .A. Terrorist Takedown 2 is a trademark of City Interactive S.A. This product co ntains the JupiterEX Technology licensed from Touchdown Entertainment Inc. Jupit erEX technology 2007 Touchdown Entertainment, Inc. and its suppliers. All Rights reserved. This product contains software technology licensed from GameSpy Indus tries, Inc. 1999-2007 GameSpy Industries, Inc. GameSpy and the Powered By GameSpy design are trademarks of GameSpy Industries, Inc. All other copyrights and trade marks are the property of their respective owners. 1. Getting Started 1.1. System Requirements Before installing Terrorist Takedown 2, you should first make sure that your com puter meets the basic system requirements: Windows XP/2000 or Windows VISTA DirectX 9.0c or higher (included on the DVD) Pentium 4 2.0GHz processor or equivalent 512 MB RAM (Windows XP/2000), 1024 MB RAM (Windows VISTA) GeForce 5700 or Radeon 9700 128 MB graphics card 2.5 GB of free hard drive space for installation Quad speed DVD-ROM 16-bit sound card with EAX 2.0 compatible with DirectX 9.0 Broadband internet access or LAN (for multiplayer only) Mouse Keyboard It is also recommended that you install the latest drivers for your graphics car d as well as all the latest service packs for your operating system. 1.2. Installing the Game In order to install the game, simply insert the Terrorist Takedown 2 DVD into yo ur DVD-ROM drive, and follow the instructions on the installation screen. If the installation screen does not appear (in particular, if you have disabled the Autostart feature in your DVD-ROM drive), follow these steps: OPTION 1: 1. Choose your DVD-ROM drive by double-click on its icon.

2. Double-click the file setup.exe. 3. Follow the on-screen instructions. OPTION 2: 1. Click on START. 2. Click on RUN. 3. Type in D:\SETUP.EXE (where 'D' is the letter of your CD ROM drive). 4. Press 'OK' button. 5. Follow the on-screen instructions. Before installing Terrorist Takedown 2, we recommend that you close all other ap plications (anti-virus software, email clients, web browsers, file sharing, inst ant messenging). Most installation problems can be avoided by closing running pr ograms. 1.3. GameSpy Comrade Should you wish to install GameSpy Comrade, you need to click Yes when prompted during the game s installation, and then follow further instructions. GameSpy Comr ade will make it significantly easier for you to find partners for your multipla yer games. 1.4. Support Support can be found online by visiting our web site at: http://www.city-interac tive.com/ You can also e-mail us at: support@city-interactive.com 1.5. Bonus Game There is a bonus game included on this DVD. If you want to play it, first of all you have to fill out a questionnaire placed on City Interactive website. You wi ll find a link to the online questionnaire website using a special link within t he game folder inside the Start menu. Once you fill out the questionnaire, you w ill be given a unique code, which you can use to install the bonus game. You wil l find a link to the bonus game s installation program within the game folder insi de the Start menu. 2. Playing the Game 2.1. Main Menu Every time you run the game, you will first find yourself inside the Main Menu. This menu presents you with the following options: Single Player by selecting this option, you will be able to either start a new g ame, or load a saved game if you already have a game in progress. Multiplayer this option allows you to set up a new multiplayer session, or join an existing multiplayer session through the Internet or LAN. Options the options menu allows you to configure the game in a variety of ways. In particular, you will be able to reconfigure the controls, change the graphics settings to better match your hardware configuration. Profile Terrorist Takedown 2 allows multiple players to maintain their own separ ate game settings and saved games on the same installed copy of the game. The Pr ofile option allows you to create, load and alter the player profiles. Quit when you re done playing the game, you will be able to exit back to Windows u sing this option. 2.2. Getting into the Action Once in the game, your goal is to complete the objectives set to you as you go t hrough the seven missions that form the single player storyline. You will find y ourself fighting terrorists and more. Rescuing the hostages from the terrorists c ertainly won t be easy! Here are a few useful tips to help you get through the game: Use the lean buttons to stick your head out from behind a wall and spot enemies. T

he enemies around the corner can still spot and kill you but you ll be a much toug her target. Always be aware of your environment. Sometimes, you ll be able to crouch behind fu rniture and use it as cover. At other times, however, you may find yourself dang erously close to an explosive gas canister... Use the zoom option to increase your accuracy and shoot enemies from a longer ra nge. Pay attention to the weapons that you use not all of them are good for everythin g. As a general rule, assault rifles are excellent long range weapons, but in cl ose quarter, they become significantly inferior to the smaller weapons like the MP-5 submachine gun or the M950 machine pistol. The latter, on the other hand, a re of precious little use when firing at long range. Sometimes, you can charge your enemies with your bayonet and kill them silently, without alerting the others to your presence. Grenades are always one of your most useful weapons. You can use them offensivel y, to kill enemies outright or flush them out from behind cover; however, they c an also be used in defence to prevent the enemy from pursuing you. If your health is low, step back away from combat and wait you will eventually r ecover. Never underestimate your enemies. If you hide behind cover, bear in mind that yo ur opponents can and will walk around the cover eventually to pursue you. 2.3. Controls While Terrorist Takedown 2 allows you to reconfigure the controls to better suit your own preferences, the game is configured by default to the following contro l scheme: Movement-related keys Move forward W Move backwards S Move to the left A Move to the right D Run hold down SHIFT Lean left Q Lean right E Jump SPACE Crouch C Interaction-related keys Fire Left Mouse Button Melee attack CTRL Use F Reload gun R Throw Grenade G Zoom Right Mouse Button Flashlight X Equipment management keys Weapon #1 1 Weapon #2 2 Weapon #3 3 Weapon #4 4 Next weapon Mouse Wheel Up Previous weapon Mouse Wheel Down Drop weapon B Holster weapon H Mission state-related keys Mission objectives TAB Check scores / refresh HUD F1 Talk T Team radio Y Team say V

Quicksave F5 Quickload F9 In-game menu ESC 2.4. Multiplayer Mode Apart from the single player storyline, Terrorist Takedown 2 also offers multipl ayer action. You will be able to choose from three different game modes in multi player: Deathmatch in this mode, you must simply fight against everybody else. You gain points for killing enemy players, and lose points for dying or for killing yours elf. Team Deathmatch like in ordinary deathmatch, you gain points for killing your op ponents; this time, however, the players are divided into two teams. You will be penalised for killing teammates. Capture the Flag in this team-based mode, the objective is to capture the enemy team s flag and bring it back to your own base. Killing other players is less impo rtant here... though of course, they certainly won t just let you walk away with t heir flag... 3. Game Story 3.1. Operation Cerberus Captain, I ve just received further instructions from the government. Looks like we re finall y set to go. All negotiations have been terminated, and we have a green light to commence the rescue operation, codenamed Cerberus. These terrorist gangs have become far, far too predictable of late. They kidnap civilians rather than government employees for a specific reason where governmen ts refuse to negotiate, a private company will always prefer to quietly pay up t o get its people back than risk waiting for a rescue. It s the same here; RCB Medi a, the employer of the kidnapped men, had already tried to work out a ransom. Every ransom paid up paves the way for further kidnappings. If we are going to r egain control of the situation here, we re going to have to put an end to ransom p ayments once and for all. That s why the government has forced RCB Media to cut al l negotiations. This means two things. One we re going in, and it s up to us to save these folks. We r e literally their only hope of survival. And two if this operation fails, we re re sponsible, in every possible way. Just between us, I m pretty sure we could rely o n the government to pin all the blame on our unit, regardless of what had actual ly happened. So, let s try not to give the tabloid sharks an easy meal, eh? But enough of this talk about failure. We re going in, and we will get those peopl e out. Get yourself ready briefing at 0800 tomorrow. I m sending you along an intel update read it carefully. There are things afoot ou t there that we don t completely understand, and that spells more trouble. One thi ng is for certain this will not be a routine counter-terrorist operation we must b e ready for anything. Colonel J. 3.2. Intel Update: Situation on the Ground We still have very little information regarding the kidnappers. The first segmen t of Operation Cerberus will indeed have to focus on obtaining further intellige nce from within the local community. Intel is currently working on making contac t with local informers who may be able to offer info. Analysis of the video material sent by the kidnappers to RCB Media indicates tha t although the kidnappers claim to belong to a new organisation (the Liberation M artyrs Command , subsequently referred to as LMC) unconnected to any currently kno wn insurgent groups, they do not appear to be significantly different in tactics or armament to those other groups. As far as training goes, individual enemy combatants within the LMC are likely t

o be significantly inferior in combat skills to our own troops. However, they wi ll be fighting on home ground, and they will in addition have the advantage of s uperior numbers: our operation relies on stealth rather than brute force. This m eans that most of the time, our operatives will be virtually alone against the e nemy. Three basic types of weapons were identified in the video footage released by th e LMC: AKS-74 assault rifle. This Soviet-era weapon needs no introduction. All of our o peratives have encountered this weapon on numerous occasions, and certainly are well aware of its main strengths and weaknesses. This assault rifle is character ised by somewhat poor accuracy (compared to our own weaponry). Calico M950 machine pistol. The Calico M950 is a commercially available machine pistol produced in the United States. The term pistol is misleading, as this weapo n s rate of fire essentially classifies it as a submachine gun. The presence of th is weapon in terrorist hands is surprising, as smuggling this weapon would pose a much bigger challenge than merely purchasing more AKS-74 rifles. The Calico is , however, frequently used by our own civilian contractors it is probable that t hey were the source of the weapon seen in the video, although there is no way to tell whether this weapon was obtained through trade, or on the battlefield. Steyr AUG assault rifle. The Steyr AUG is one of the standard assault rifles in the NATO arsenal. It is a solid, reliable weapon based on a modern bullpup confi guration. The Steyr AUG is also utilised by the Pakistani Army, and thus can fre quently be found on the black market in this part of the world. In addition, we must bear in mind the possibility that the LMC is in possession of Stinger missiles. Although there is no evidence that would confirm this possi bility, past experience indicates that it remains very likely. As a consequence, all operations involving helicopters or other slow-moving aircraft must be plan ned with extreme caution. Another important piece of information is the confirmed presence of Thomas Cobur n in Iskandariyya. Thomas Coburn, a retired US Army Colonel, renowned and decora ted veteran of the Vietnam War, has in the recent years been spotted in several of the world's most notorious hotspots working as a mercenary. We can only presu me that his role here is similar, but we do not know who his current employer is . What is known for certain is that he is not employed by us, nor by any of the ot her coalition members, nor any of the civilian security companies known to work in the country. An intercepted radio transmission seems to suggest, however, tha t he may in fact be working in the employ of the LMC. This would certainly be a very dangerous precedent, as there have thus far been no confirmed cases of Euro pean or American mercenaries working for local insurgent movements in this part of the world. The transmission is actually unclear enough that it is possible to draw the exact opposite conclusion, that is to say that Coburn is going after t he LMC. Regardless of what his role is, however, Coburn is involved somehow in t his affair. Should this man be encountered by our operatives in Iskandariyya, ex treme caution is recommended. We must also point out, however, that as an Americ an citizen, Coburn should not under any circumstances be automatically considere d an enemy combatant unless the situation is clear beyond all doubt. Like any ci tizen from a coalition country, he should be given some (limited) benefit of the doubt even when armed. Nonetheless, until Coburn's role in this affair can be b etter understood, he must be considered a potential (and significant) threat.

You might also like