Skip to content

The Network

The Network

AX.GM.07.04

The Network is not a name the organization uses for itself. It is what outsiders call the loose, distributed system of communication, mutual aid, and operational coordination that connects independent hunters, investigators, and specialists across the country. The Network has no headquarters, no central leadership, no membership roll, and no official existence. What it has is a set of protocols, how to make contact, how to verify someone is who they say they are, how to pass information between people who have never met and may never meet, that have accumulated over decades of necessity.

If you know the right approach, the Network can tell you who the local expert is on demonic possession in the upper Midwest, get a message to a hunter who is off-grid in the Pacific Northwest, or confirm whether the weird thing that happened in your town last month matches a pattern someone else has seen somewhere else. It does not coordinate operations. It does not give orders. It connects people who do the work independently and lets them decide whether to work together.

The Network exists because the work requires information that no other institution makes available in usable form. Government agencies classify what they find. Academic institutions don't believe it. Religious organizations have doctrinal filters on what they'll acknowledge. The Network is what accumulated in the gap, the oral tradition and practical knowledge base of people who learned what works because they had to.

History

The Network's oldest verifiable thread traces to the mid-twentieth century: a set of correspondence and information-sharing practices among families and individuals who had been dealing with supernatural threats in their communities for generations and recognized, at some point, that they were not alone. The correspondence was informal, letters, later phone trees, later digital channels, and the early protocols were basic: how to verify someone wasn't the thing they were claiming to investigate.

The verification protocols are the Network's oldest formal element. They predate email, predate the internet, and predate several of the threat categories they now cover. Current verification protocols involve a rotating set of questions, countersigns, and challenge-and-response patterns that are updated periodically by a process nobody entirely controls, changes accumulate when enough nodes in the network start using them and the old pattern fades.

The Network's operational knowledge base, what works on what, which materials are effective, which approaches have been tried and failed, exists in several forms: written collections that circulate in physical copies among trusted contacts, digital archives on servers whose locations are known only to the people who maintain them, and the memories of people who have been doing this long enough to have tried most of what's in the written record.

Structure

The Network has no formal structure. It has functional roles that emerge from practice:

Information Nodes: Individuals or small groups who maintain connections to many other Network contacts, receive and pass along threat intelligence, and serve as hubs for matching people who need help with people who can provide it. Being a node is not a title; it is a function that develops when someone proves reliable enough that people start calling them.

Regional Specialists: Hunters or investigators with deep knowledge of specific threat categories or geographic areas. Their expertise is known to the nodes. They are consulted rather than directed.

Lore Keepers: People who maintain physical or digital archives of operational knowledge. Some are active hunters. Some are retired. Some never hunted at all; they came to the knowledge through research or inheritance and chose to preserve it rather than use it directly.

Active Hunters: The working population of the Network. Ranging from solo operators to small teams, from people who do this full-time to people with ordinary lives who respond when something happens in their area. The Network does not categorize them; they are whoever showed up and proved useful.

Operations

Network operations are decentralized by design. When a hunter identifies a threat that exceeds their capacity, they reach out through their node contact. The node contacts relevant specialists, matches available personnel, and passes information. What the assembled parties do with that information is their decision.

Information exchange: The Network's primary operational function. Threat identification, behavioral patterns, known weaknesses, effective materials, regional history, contact information for specialists. The exchange is informal but the information is real; it represents accumulated practical knowledge from people who tested it under field conditions.

Resource exchange: The Network facilitates access to materials that are difficult to source conventionally, blessed ammunition, silver-core rounds, cold iron implements, specialized research texts, and equipment that commercial channels don't carry. The exchange is favors-based rather than financial. Contributing to the network, sharing information, providing support, passing resources along, builds the kind of credit that gets returned.

Verification: The Network's verification protocols serve two functions: confirming that a contact is a genuine Network participant, and filtering for parties who might use Network resources in ways the network's participants would collectively object to. The filters are imperfect. The network has been infiltrated, used, and occasionally betrayed. It has survived these because no single point of failure compromises the whole.

Relations

Bureau of Unusual Affairs: The BUA is aware of the Network and has chosen not to officially acknowledge it. Some BUA agents use Network contacts informally. Network participants have a range of opinions about BUA agents, some find the federal resources useful, others consider federal contact a security risk. The informal arrangement works because both parties benefit from it and neither wants the alternative.

Vanguard Unit: The Network's relationship with the Vanguard is cautious. The Vanguard moves fast, leaves less, and has a narrower definition of who counts as a threat than the Network considers appropriate. Hunters who have worked near Vanguard operations tend to develop opinions. The Network does not officially advise against contact, but the informal advice is to know what you're dealing with before you invite military involvement.

Safe Harbor: Many Network participants maintain positive relationships with Safe Harbor's protection operations. The Network provides threat intelligence; Safe Harbor occasionally provides safe passage for hunters operating in areas where hidden-world community tensions are high. The relationship is informal and transactional rather than structured.

The Grimoire Compact: Some Network lore keepers have Compact connections, the Compact's research resources and the Network's operational knowledge base are complementary, and individuals who bridge both communities are valued by both. Formal coordination is rare; informal connection is common.

The Bloodline Courts, The Hollow Market: The Network has participants who have positive working relationships with hidden-world communities and participants who categorically don't. The network does not have a unified position on nonhuman organizations. Individual hunters develop their own.

Secrets

The Network's oldest archives, physical collections maintained by families who have been doing this for generations, contain records that predate the current understanding of why supernatural threats exist and what they actually are. Some of what those records describe doesn't fit the contemporary frameworks. A few lore keepers are aware of the discrepancies and have been sitting with the question of what it means for a long time.

The verification protocols have a backdoor that most current Network participants don't know about, a set of countersigns from the network's early correspondence period that still work and that are known to a small number of older participants. The backdoor exists because there have been situations where official verification channels were compromised and the older layer provided continuity. It also means that someone who knows the older layer can access Network resources without going through current verification.

The Network has lost members to the things they hunted. This is expected and mourned. It has also lost members to organizations that considered the Network's participants operational liabilities, including, on at least two occasions, the Vanguard Unit. These events are known to older participants and are a significant factor in the Network's institutional wariness toward federal contact.

Professions

Hunter

You learned what works. You learned why it works when you could and accepted that sometimes it just does when you couldn't. The important thing is that it works.

Favored Save: Body Save (+1D to Body + Fortitude rolls)

Power Access: None by default. A Hunter profession does not grant Power Access, the Network doesn't require practitioners, and most hunters are mundane humans working with material approaches and practical knowledge. Hunters who are also lineage practitioners access their traditions through their lineage and through Progression Track Stage 2, not through the profession itself.

Starting Resources: Personal weapon (hunter's choice, most have at least one mundane weapon and one threat-specific material in their standard kit), a Network contact (an information node they can reach), and a working knowledge of the Network's verification protocols.

Lineage Affinity: All lineages. The Network does not filter by lineage, hunters are whoever showed up and proved useful.

Progression Track: Hunter

Stage 1 (10 XP), Established Contact
  The hunter has proven reliable enough to be trusted with more of the
  Network's actual resources.
  - Network Pull: Once per session, the hunter may contact their node and
    request specific information, threat identity, local specialist, material
    sourcing, historical incident records. The GM determines how completely and
    quickly the request is fulfilled based on what the Network plausibly knows.
    Well-connected nodes are faster; obscure or specialized requests take longer.
  - Threat Knowledge: The hunter's accumulated experience gives them working
    knowledge of one specific threat category (player's choice at Stage 1).
    For threats of that category, the hunter knows the standard weakness and
    destruction method without a roll.

Stage 2 (25 XP), Reliable Operator
  The hunter has done enough work that the Network knows who they are.
  - Favor Economy: The hunter has built Network credit, contributions of
    information, resources, or operational support that can be drawn on.
    Once per session, the hunter may call in a favor: another hunter or
    specialist provides backup for the current scene, or a needed resource
    (specific ammunition, a specialist tool) is arranged within a scene's time
    frame. Calling in a favor of this kind creates an expectation of return.
  - Power Access (Lineage Tradition): If the hunter has a lineage with Power
    Access and has not previously accessed a tradition, they may now do so at
    1D (no Talent cost). The Network's loose collection of practitioners has
    given them access to enough context to begin formalizing what their lineage
    already provides.

Stage 3 (50 XP), Node
  The hunter has become a hub, the person other people call when they don't
  know who else to call.
  - Hub Function: The hunter functions as an information node. They receive
    threat intelligence from across the Network's contact web before it would
    otherwise reach them, the GM provides one piece of proactive threat
    intelligence per session that the hunter's contacts have surfaced. The
    hunter decides what to do with it.
  - Emergency Assembly: Once per campaign, the hunter can call in the Network's
    collective attention to a specific threat. This represents mobilizing
    multiple experienced hunters toward a single problem. The assembled
    assistance is significant and real, but the threat has to be significant
    enough to justify it, calling the full Network for a local problem burns
    credit that takes a long time to rebuild.

Lore Keeper

Most of what you know came from people who learned it the hard way. Your job is to make sure the cost of that education isn't paid again.

Favored Save: Wit Save (+1D to Wit + Resolve rolls)

Power Access: Mediumship or Glamourist (optional). Lore Keepers who are practitioners often maintain their tradition alongside their archival work, the two reinforce each other. Access at 1D, no Talent cost, requires the Lore Keeper to have a lineage that supports the tradition.

Starting Resources: A personal archive, physical, digital, or both, representing the Lore Keeper's accumulated research. Access to at least one other significant archive through their Network connections. A working knowledge of the verification protocols and a reputation for keeping information secure.

Lineage Affinity: Human, Haunt, Faeborn. The Lore Keeper role draws toward lineages with strong cognitive and perceptive Wit profiles.

Progression Track: Lore Keeper

Stage 1 (10 XP), Research Depth
  The Lore Keeper has developed the archive and the judgment to use it.
  - Threat Research: Given access to their archive and a scene's worth of
    time, the Lore Keeper can produce a working threat assessment, weakness,
    known behavioral patterns, documented destruction methods, for any threat
    category the archive covers. A Wit + Lore roll vs Threshold 2 surfaces
    the relevant material. Threshold 3+ surfaces obscure or variant information.
  - Source Evaluation: The Lore Keeper can assess the reliability of a piece
    of information, whether it comes from firsthand field experience or
    secondhand account, whether it has been independently confirmed, whether
    it contradicts other reliable sources. This does not require a roll for
    information within their established specialty; for outside their specialty,
    Wit + Lore vs Threshold 2.

Stage 2 (25 XP), Archive Authority
  The Lore Keeper's archive and reputation have made them a destination.
  - Extended Research: The Lore Keeper can conduct extended research on a
    specific question between sessions. The GM provides one piece of
    significant discovered information per downtime period, something from
    the archive that is relevant to the current investigation and that the
    character would plausibly find with dedicated research time.
  - Cross-Reference: When two or more separate incidents or threat signatures
    are described to the Lore Keeper, they may identify connections the field
    team has not noticed (Wit + Lore vs Threshold 3). A successful roll
    surfaces a genuine pattern, historical precedent, or common factor.

Stage 3 (50 XP), Primary Source
  The Lore Keeper has become one of the Network's most significant knowledge
  resources, and a target for parties who would prefer that knowledge
  unavailable.
  - Archive Access: The Lore Keeper has either expanded their own archive to
    cover all current threat categories in the catalog, or has established
    relationships with other archives sufficient to functionally cover them.
    No threat category is beyond their research capacity, though obscure
    variants and emerging threats still require a roll.
  - Institutional Memory: The Lore Keeper knows things that have happened
    before, historical incidents, past actors, the outcomes of situations
    that parallel the current one. Once per session, the GM provides one piece
    of historical intelligence that directly informs the current situation: a
    precedent, a prior actor, an outcome from a similar case that carries
    meaningful information about what is likely to happen now.

Plot Hooks

  • A piece of Network intelligence has proven to be wrong, specifically, the destruction method on file for a threat category the characters are currently dealing with. Someone put that information into the network intentionally. The question is who and why.
  • A lore keeper has gone quiet. Their node contact asks the characters to check in. The archive exists. The lore keeper does not.
  • A hunter using Network verification protocols has made contact claiming to be someone the characters know. The characters have recently confirmed that person is dead.
  • The oldest physical archive in the Network has surfaced on the open market. The seller knows what it is. The buyer pool includes at least one party the Network would consider catastrophically inappropriate.