Alpha Protocol Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Recent Blog Posts
Beginner Guide
Dossier
Characters
Michael Thorton
Mina Tang
Henry Leland
Steven Heck
Conrad Marburg
Albatross
SIE
Madison St James
Factions
Alpha Protocol
Al-Samad
Halbech Corporation
G22
VCI
Chinese Secret Police
Operations
Operation Desert Spear
Operation Blood Feud
Operation Deus Vult
Operation True Heirs
Operation Full Circle
Helping Out
Wanted Pages
Dead End Pages
Short Pages
Deletion Log
Users List
Double Redirects
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
Alpha Protocol Wiki
286
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Recent Blog Posts
Beginner Guide
Dossier
Characters
Michael Thorton
Mina Tang
Henry Leland
Steven Heck
Conrad Marburg
Albatross
SIE
Madison St James
Factions
Alpha Protocol
Al-Samad
Halbech Corporation
G22
VCI
Chinese Secret Police
Operations
Operation Desert Spear
Operation Blood Feud
Operation Deus Vult
Operation True Heirs
Operation Full Circle
Helping Out
Wanted Pages
Dead End Pages
Short Pages
Deletion Log
Users List
Double Redirects
Editing
Computer
Back to page
Edit
Edit source
View history
Talk (0)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
[[File:Computer Time.jpg|right|300px]] '''Computers''' are found throughout the world of [[Alpha Protocol]], the personal computers of [[Michael Thorton]] in his [[Safehouse|safehouses]] or the ones he finds in [[missions|the field]]. Through his personal computers used during his missions in [[Saudi Arabia]], [[Moscow]], [[Rome]], and [[Taipei]], or his laptop at once he finishes his goals, Thorton can access his [[E-mail|e-mails]], or buy gear from [[Clearinghouse|The Clearinghouse]]. The computers Mike finds in the field can either be [[Sabotage|hacked]] or sliced via [[Technical Aptitude|tuned EMP charges]]. These computers will yield [[Dossier|information]], emails between his targets, or hidden bank accounts that Thorton can obtain money from. [[File:Laptop.jpg|thumb|none]] [[Category:Technology]]
Summary:
Please note that all contributions to the Alpha Protocol Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Follow on IG
TikTok
Join Fan Lab