Chapter 8: When Deals Go Bad
"Violence is the last resort of the incompetent. Sometimes we're all incompetent."
Conflict resolution for morally complex scenarios.
📖 Modifies STA Core Rulebook, Chapter 8: Conflict
Social Conflicts
Negotiations, standoffs, and betrayals
Negotiation Frameworks
- Interest-based bargaining vs. positional haggling
- Information asymmetry and leverage assessment
- BATNA (Best Alternative to Negotiated Agreement) development
- Multi-party negotiations and coalition dynamics
Preparation: Research, goal setting, and strategy development Opening: Relationship establishment and initial positioning Exploration: Information gathering and option generation Bargaining: Offer exchange and compromise development Closing: Agreement finalization and implementation planning
High-Stakes Negotiations
- Life-or-death bargaining situations
- Hostage negotiations and prisoner exchanges
- Territory disputes and resource conflicts
- Information trading and intelligence exchanges
Pressure: Time limits, external threats, escalating stakes Leverage: Power balance shifts and advantage exploitation Psychology: Stress management and emotional manipulation Consequences: Deal failure costs and success benefits
Betrayal and Double-Cross Scenarios
- Trust violation detection and response
- Counter-betrayal planning and execution
- Information security and compartmentalization
- Relationship recovery and damage limitation
Warning Signs: Behavioral changes and suspicious activities Verification: Trust testing and loyalty confirmation Response: Immediate threats and long-term consequences Prevention: Security measures and relationship management
Standoff Management
- Mexican standoff dynamics and resolution
- Prisoner's dilemma and cooperation incentives
- Face-saving and dignity preservation needs
- De-escalation techniques and tension reduction
Psychology: Pride, fear, and rational calculation balance Communication: Clear signaling and misunderstanding prevention Mediation: Third-party intervention and neutral facilitation Resolution: Win-win outcomes and mutual benefit identification
Lethal Combat
When stunning isn't an option
Escalation Ladders
- Threat assessment and appropriate response selection
- Non-lethal alternatives and de-escalation opportunities
- Lethal force justification and moral considerations
- Post-conflict consequences and trauma management
Stages: Verbal warnings, physical intimidation, non-lethal force, lethal response Triggers: Threat level assessment and response threshold crossing Alternatives: Creative solutions and unexpected options Consequences: Legal, moral, and psychological aftermath
Deadly Weapons and Combat Options
- Disruptor settings beyond stun levels
- Projectile weapons and ballistic considerations
- Edged weapons and close-quarters combat
- Improvised weapons and environmental hazards
Effectiveness: Damage potential and incapacitation rates Availability: Legal restrictions and acquisition difficulties Training: Skill requirements and safety considerations Forensics: Evidence trails and investigation complications
Combat Tactics for Criminal Operations
- Ambush planning and execution techniques
- Suppression fire and area denial methods
- Breaching and room-clearing procedures
- Extraction under fire and casualty evacuation
Surprise: Initiative advantages and first-shot opportunities Positioning: Cover utilization and movement coordination Communication: Non-verbal signals and noise discipline Timing: Coordination and simultaneous action execution
Moral Consequences of Lethal Force
- Character value challenges and ethical compromises
- Psychological trauma and PTSD considerations
- Reputation effects and faction standing changes
- Legal consequences and law enforcement response
Character Development: Growth through moral challenge navigation Relationships: Team dynamics and trust effects Society: Public perception and community standing Future: Long-term consequences and reputation management
Ambush & Stealth
Dirty fighting and surprise attacks
Ambush Planning and Setup
- Target pattern analysis and vulnerability identification
- Position selection and escape route planning
- Equipment placement and concealment techniques
- Timing coordination and signal systems
Intelligence: Target behavior prediction and schedule analysis Positioning: Advantage maximization and detection risk minimization Coordination: Team member placement and communication protocols Contingency: Plan adaptation and failure response preparation
Stealth Operations and Infiltration
- Movement techniques and noise discipline
- Concealment methods and camouflage application
- Security system bypass and alarm avoidance
- Sentry elimination and guard rotation exploitation
Skills: Physical conditioning and technique training Equipment: Specialized gear and technology assistance Environment: Terrain utilization and weather advantages Psychology: Stress management and confidence maintenance
Dirty Fighting Techniques
- Below-the-belt tactics and unfair advantages
- Environmental weapon utilization and improvisation
- Psychological warfare and intimidation methods
- Gang-up tactics and numerical superiority exploitation
Ethics: Honor vs. survival consideration balance Effectiveness: Quick incapacitation and conflict termination Risk: Escalation potential and retaliation consequences Training: Technique development and moral boundary setting
Counter-Surveillance and Detection Avoidance
- Surveillance detection and counter-surveillance techniques
- Electronic countermeasures and signal jamming
- Pattern disruption and behavior modification
- False trail creation and misdirection operations
Awareness: Threat recognition and response preparation Technology: Detection equipment and countermeasure systems Behavior: Natural acting and suspicious activity avoidance Planning: Route selection and timing optimization
Interrogation & Intimidation
Getting information through pressure
Psychological Pressure Techniques
- Fear induction and threat implication
- Isolation and sensory deprivation effects
- Time pressure and deadline creation
- Social pressure and peer influence utilization
Ethics: Torture prohibition and humane treatment requirements Effectiveness: Reliability vs. expediency considerations Resistance: Training and psychological resilience factors Alternatives: Incentive-based and cooperative approaches
Information Extraction Methods
- Good cop/bad cop role differentiation
- False evidence and bluff utilization
- Relationship exploitation and emotional manipulation
- Gradual revelation and incremental commitment
Preparation: Subject research and vulnerability analysis Environment: Setting control and psychological advantage Timing: Optimal pressure application and resistance breakdown Verification: Information accuracy and corroboration needs
Intimidation and Threat Assessment
- Credible threat establishment and communication
- Reputation leverage and fear factor utilization
- Physical presence and non-verbal communication
- Consequence demonstration and example setting
Subtlety: Implied vs. explicit threat communication Escalation: Graduated response and increasing pressure Effectiveness: Target psychology and resistance assessment Backlash: Retaliation risk and protection needs
Legal and Ethical Considerations
- Information admissibility and legal consequences
- Witness protection and safety concerns
- International law and jurisdiction complications
- Moral boundaries and character value challenges
Documentation: Evidence handling and chain of custody Rights: Subject protections and legal representation Oversight: Authority approval and accountability measures Consequences: Legal liability and ethical responsibility
Chase Sequences
Pursuit through stations and systems
Foot Chase Dynamics
- Urban environment navigation and obstacle utilization
- Crowd dynamics and civilian interference
- Vertical movement and three-dimensional pursuit
- Stamina management and endurance considerations
Environment: Terrain advantages and hazard navigation Skills: Athletics, parkour, and environmental awareness Equipment: Pursuit aids and movement enhancement Consequences: Civilian casualties and property damage
Vehicle Pursuit Operations
- High-speed maneuvering and evasive action
- Traffic navigation and civilian safety
- Damage assessment and system failure management
- Fuel consumption and range limitations
Skills: Conn, Engineering, and tactical awareness Modifications: Performance enhancement and defensive systems Environment: Space lanes, asteroid fields, planetary surfaces Escalation: Weapon deployment and ramming attacks
Multi-Environment Chases
- Transition between space, atmosphere, and surface
- Transportation mode changes and transfer points
- Jurisdiction boundaries and authority limitations
- Resource coordination and asset deployment
Planning: Route knowledge and alternative preparation Adaptation: Circumstance changes and opportunity exploitation Communication: Coordination and information sharing Endurance: Extended pursuit and resource management
Pursuit Termination Methods
- Evasion and disappearance techniques
- Confrontation and direct resolution
- Negotiation and surrender terms
- Diversion and misdirection tactics
Success: Clean escape and evidence elimination Failure: Capture consequences and legal proceedings Compromise: Partial success and damage limitation Learning: Experience improvement and future preparation
Moral Consequences
Tracking the cost of violent choices
Character Value Erosion
- Gradual compromise and boundary shifting
- Rationalization and self-justification patterns
- Peer pressure and group normalization effects
- Recovery and redemption possibility assessment
Measurement: Value challenge frequency and severity Documentation: Character sheet notation and tracking systems Roleplay: Internal conflict and decision difficulty representation Growth: Learning opportunities and moral development paths
Psychological Trauma Effects
- PTSD symptoms and behavioral changes
- Relationship difficulties and trust issues
- Performance degradation and decision paralysis
- Treatment options and recovery processes
Symptoms: Flashbacks, nightmares, hypervigilance, emotional numbing Triggers: Environmental cues and stress activation Coping: Healthy and unhealthy mechanism development Support: Professional help and peer assistance availability
Social Relationship Impact
- Team dynamics and trust deterioration
- Family relationships and civilian connections
- Professional reputation and network standing
- Community perception and social isolation
Communication: Honest discussion and secret keeping Understanding: Perspective sharing and empathy development Boundaries: Comfort levels and interaction limits Rebuilding: Trust restoration and relationship repair
Long-term Consequences
- Career trajectory and opportunity effects
- Legal liability and prosecution risks
- Health impacts and medical needs
- Legacy considerations and final judgments
Planning: Future consequence consideration and mitigation Adaptation: Life change and path adjustment needs Acceptance: Reality acknowledgment and peace making Redemption: Positive action and amends making opportunities
Reputation Damage
How conflicts affect faction standing
Faction Relationship Mechanics
- Standing point loss and gain calculations
- Severity modifiers and context considerations
- Witness presence and information spread effects
- Recovery timeline and effort requirements
Measurement: Numerical tracking and threshold effects Modifiers: Action severity, witness count, faction values alignment Consequences: Service availability, pricing, protection levels Recovery: Reputation repair actions and time investment
Information Warfare and Spin Control
- Narrative management and story control
- Counter-intelligence and false information spread
- Witness intimidation and evidence suppression
- Media manipulation and public perception management
Strategy: Proactive vs. reactive approach selection Resources: Information network and influence capability Timing: Response speed and message coordination Effectiveness: Audience reach and credibility assessment
Damage Limitation Strategies
- Immediate response and crisis management
- Scapegoat identification and blame deflection
- Compensation and amends making efforts
- Future behavior modification and commitment demonstration
Assessment: Damage scope and affected parties identification Prioritization: Critical relationships and expendable connections Resources: Available assets and influence leverage Timeline: Recovery duration and milestone planning
Cross-Faction Complications
- Multiple faction relationship management
- Conflict spillover and alliance effects
- Reputation transfer and guilt by association
- Balancing competing interests and loyalties
Complexity: Multiple relationship tracking and management Conflicts: Competing faction interest navigation Opportunities: Alliance building and mutual benefit identification Risks: Overcommitment and impossible promise consequences