• Overview
  • Map
  • Areas
  • Points of Interest
  • Characters
  • Races
  • Classes
  • Factions
  • Monsters
  • Items
  • Spells
  • Feats
  • Quests
  • One-Shots
  • Game Master
  1. VALLEY OF THE END: FOUNDERS’ LEGACY
  2. Lore

PAGE 13 — INTELLIGENCE & INFORMATION WARFARE SYSTEM

INTELLIGENCE & INFORMATION WARFARE SYSTEM

Knowledge Control & Strategic Visibility Rules
Valley of the End: Founders’ Legacy


13.0 PURPOSE

This system governs:

• what characters know
• how information spreads
• how espionage functions
• how secrets are protected
• how misinformation operates

In the shinobi world, information is a strategic weapon.

Battles are not only fought with chakra and steel — they are fought with:

• secrets
• rumors
• intercepted messages
• hidden identities
• manipulated narratives

No character possesses automatic narrative awareness.

Knowledge must be earned, discovered, or extracted.


13.1 INFORMATION TIERS

All knowledge in the world exists in five security tiers.

These tiers determine who can realistically know something.


Tier 1 — Public Knowledge

Information widely known by civilians and shinobi alike.

Examples:

• existence of hidden villages
• basic shinobi ranks
• well-known clan names
• major historical battles

No restriction on access.


Tier 2 — Restricted Knowledge

Known to active shinobi but not civilians.

Examples:

• mission classifications
• general military structure
• known rogue threats
• basic intelligence reports

Typically available to Genin and above.


Tier 3 — Classified

Limited to experienced shinobi or leadership.

Examples:

• sensitive mission details
• intelligence operations
• internal investigations
• secret clan techniques

Usually accessible to Chūnin, Jōnin, or command staff.


Tier 4 — Black-Level Intelligence

Highly restricted intelligence.

Known only to:

• elite shinobi
• intelligence divisions
• ANBU-level operatives
• village leadership

Examples:

• covert assassination operations
• forbidden research
• secret alliances
• sealed weapon programs

Exposure can destabilize villages.


Tier 5 — Hidden Conspiracy

Knowledge known only to extremely few individuals.

Examples:

• Black Zetsu’s manipulation of events
• the true origin of certain ancient powers
• long-term world-level conspiracies

This information cannot be discovered casually.

It requires major narrative progression.


13.2 KNOWLEDGE ACCESS RULE

Characters must actively pursue information.

Information may be obtained through:

• reconnaissance
• surveillance
• interrogation
• infiltration
• captured documents
• sensor analysis
• diplomatic channels

No character automatically knows:

• hidden villain identities
• secret organizations
• classified political plans

There is no meta-knowledge.


13.3 INTELLIGENCE GATHERING METHODS

Information may be acquired through several methods.


Surveillance

Monitoring enemy activity.

Examples:

• watching border patrol routes
• observing meeting locations
• tracking messenger routes

Provides partial information.


Intercepted Communication

Capturing messages, codes, or signals.

Examples:

• written orders
• encrypted scrolls
• messenger birds

Often requires decoding or interpretation.


Interrogation

Captured enemies may reveal information.

However:

• they may resist
• they may lie
• they may know very little

Information quality varies.


Infiltration

Entering hostile territory or organizations.

This method provides high value intelligence but carries high risk.

Exposure may cause:

• diplomatic crisis
• assassination retaliation
• war escalation


13.4 INFORMATION RELIABILITY

Not all intelligence is accurate.

Each piece of information may fall into one of three categories:

Confirmed

Verified through multiple sources.

Partial

Contains truth but incomplete context.

False

Deliberate misinformation or incorrect assumptions.

Shinobi must verify information before acting on it.


13.5 MISINFORMATION OPERATIONS

Villages may intentionally manipulate information.

Examples include:

• planting false documents
• staging attacks under another faction’s identity
• leaking misleading intelligence
• spreading rumors

Misinformation is a strategic tool used to:

• provoke conflict
• conceal operations
• misdirect investigations

Players should never assume information is automatically correct.


13.6 RED DAWN INFORMATION CONTROL

Red Dawn uses extreme compartmentalization.

Its structure operates on cell isolation.

Members typically know:

• their mission objective
• their immediate contact
• their operational role

They usually do not know:

• the full leadership structure
• the long-term strategic goal
• the identities of other cells

This prevents easy exposure of the entire organization.


13.7 BLACK ZETSU LIMITER

Black Zetsu manipulates events indirectly.

He:

• rarely appears publicly
• never reveals full plans
• operates through manipulation and influence

He does not explain the cosmic backstory.

He does not reveal Kaguya early.

He does not monologue his strategy.

His role must remain hidden until extremely late narrative stages.

Mystery is essential.


13.8 SENSOR LIMITATIONS

Sensory shinobi detect chakra — not thoughts.

Detection may reveal:

• approximate location
• chakra intensity
• emotional instability
• possible elemental alignment

Sensors cannot instantly identify individuals without prior familiarity.

They cannot read:

• memories
• intentions
• hidden affiliations

Sensor data must be interpreted.


13.9 INTERROGATION & GENJUTSU LIMITS

Genjutsu interrogation has limits.

It may extract:

• surface memories
• recent events
• emotional responses

However:

• strong minds may resist
• trained agents may hold false memories
• victims may only know partial information

Genjutsu does not automatically reveal all secrets.


13.10 INFORMATION LEAK CONSEQUENCES

If classified intelligence becomes public:

• political tension increases
• intelligence investigations begin
• diplomatic relations deteriorate
• assassinations may follow

Information leaks can destabilize entire regions.

Secrets must matter.


13.11 WORLD MEMORY RULE

The world must remember information exposure.

The system must track:

• who knows specific secrets
• who revealed those secrets
• who suspects hidden agendas

Once information spreads, it cannot be erased casually.

Actions create lasting consequences.


13.12 VALIDATION CHECK

Before revealing critical information, confirm:

✔ Is the character entitled to know this?
✔ Was the information discovered through effort?
✔ Does the secrecy tier allow this knowledge?
✔ Does the reveal maintain narrative mystery?
✔ Will this change the world state?

If these conditions are not met:

The information must remain hidden.