0% found this document useful (0 votes)
2 views7 pages

Game Flow

The Great Heist – Teen Edition is an interactive role-playing game where students act as members of a heist crew, each with unique roles and challenges that require teamwork and English communication skills. The game includes various phases such as planning, hacking, negotiating, and solving puzzles to successfully crack a vault. Students engage in fun, improvisational scenarios while developing leadership, negotiation, and clear communication skills.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views7 pages

Game Flow

The Great Heist – Teen Edition is an interactive role-playing game where students act as members of a heist crew, each with unique roles and challenges that require teamwork and English communication skills. The game includes various phases such as planning, hacking, negotiating, and solving puzzles to successfully crack a vault. Students engage in fun, improvisational scenarios while developing leadership, negotiation, and clear communication skills.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

💰 The Great Heist – Teen Edition:

Expanded Version
‍♂️Overview

Students will take on the roles of elite heist crew members attempting to crack a highly
secured vault. Along the way, they must overcome obstacles, negotiate, and role-play
their way through the mission using their English skills.

👥 Character Roles & Fictitious Backgrounds


(Encourage Role-Playing)
Each student is not just a specialist but also has a unique personality and backstory
to act out during conversations.

1️⃣ The Mastermind (Leader)

 Charismatic and highly intelligent, they plan the heist and make final
decisions.
 Obstacle: Must convince the team on strategy choices (discussion-based).
 Speaking Task: Leads discussions, asks questions, makes final choices.
 Catchphrase: “We never leave a trace.”

2️⃣ The Hacker (Tech Specialist)

 A genius with technology, responsible for hacking doors, alarms, and security
cameras.
 Obstacle: Must explain a fake "hacking process" step by step to the group.
 Speaking Task: Describes what they're “doing” in detail.
 Catchphrase: “One more second… I’m in.”

3️⃣ The Distraction Expert (Smooth Talker)

 A master of deception, they must talk their way past guards and obstacles.
 Obstacle: Must convince an NPC (teacher) that they’re harmless.
 Speaking Task: Negotiates, role-plays a casual conversation with the "guard".
 Catchphrase: “Who, me? I’m just a janitor.”

4️⃣ The Acrobat (Stealth & Agility Expert)

 Sneaky and flexible, responsible for dodging laser alarms.


 Obstacle: Must give and receive instructions on movement without touching
“laser lines” (strings/tape on floor).
 Speaking Task: Gives & follows movement directions in English.
 Catchphrase: “Silent as a shadow.”

5️⃣ The Safe Cracker (Puzzle Solver)

1
 Specializes in unlocking safes using puzzles and logic.
 Obstacle: Must solve riddles and puzzles to crack the safe.
 Speaking Task: Explains reasoning behind puzzle answers out loud.
 Catchphrase: “Every lock has a weakness.”

🛑 Expanded Obstacles & Steps


Each phase of the mission requires conversation and teamwork.

Step 1: The Blueprints (Planning Phase)

 Task: The Mastermind leads a discussion to assign roles.


 Obstacle: The team must examine a “blueprint” (a classroom map) and decide
the best route.
 Speaking Task: The Mastermind asks, “Where should we enter?”, “What risks
do we face?”, etc.

2
3
4
Step 2: The Security Room

 Obstacle: The Hacker must "disable" security by explaining a complex (fake)


hacking process.
 Extra Challenge: If the explanation isn’t convincing or logical, the “system detects an
intruder,” and they must redo it in more detail.
 🧑‍💻 Hacker: “Alright, we’ve reached the security room. I’m accessing the mainframe
now… Give me a second.”
 👀 Lookout: “Wait, how do we even know what we’re looking for?”
 🧑‍💻 Hacker: “We need to disable the motion sensors before the cameras scan our faces.
I’m overriding the mainframe using an encrypted algorithm.”
 🤨 Mastermind: “Okay… what does that actually mean?”
 🧑‍💻 Hacker: “It means I’m tricking the system into thinking we’re just part of the
bank’s normal operations. Basically, I inject a script that reconfigures the firewall
permissions.”
 😰 Distraction Expert: “Firewall? Script? Dude, I don’t even know what that means.
Will it work, or are we about to set off every alarm in the city?”
 🧑‍💻 Hacker: “Relax. I’ve done this before... Okay, running the bypass now… Accessing
the bank’s security protocols… I just need to locate the central server.”
 🔑 Safe Cracker: “How do you even find that?”
 🧑‍💻 Hacker: “Simple. Every system has a central hub where all permissions are
controlled. Once I locate the correct IP address, I can force a temporary admin
override.”
 👀 Lookout: “Wait, what’s that flashing light on the screen?”
 🧑‍💻 Hacker: “Crap. The system detected an unauthorized access attempt. It’s asking
for two-factor authentication.”
 🤔 Mastermind: “Can’t you just fake it?”
 🧑‍💻 Hacker: “I can try… but I need a verification code. Usually, this would be sent to
the bank manager’s phone.”
 😎 Distraction Expert: “Good thing I swiped a clipboard from the guard’s desk
earlier. Maybe there’s a number on here…”
 📱 Safe Cracker: “Try this one: 4521. It’s written on the corner of the page.”
 🧑‍💻 Hacker: “Alright, entering 4521… Processing… YES! We’re in!”
 🔔 [ALERT SOUND]
 🚨 Lookout: “Wait—what was that?! Was that an alarm?”
 🧑‍💻 Hacker: “No, no, it’s just a system notification. Looks like security logs are being
updated… but that gives us about five minutes before the system reboots and notices
us. We need to move—NOW!”
 👀 Mastermind: “Okay, where’s our next target?”
 🧑‍💻 Hacker: “The vault. But it’s locked behind another system—one with a rotating
passcode.”
 🤔 Safe Cracker: “And let me guess… You don’t know what it is?”
 🧑‍💻 Hacker: “Not yet. But if we can distract security for a minute, I can generate a one-
time code to bypass it.”
 👀 Mastermind: “Alright, team, we’ve got one minute before security realizes we’re in
the system. Let’s move!

Step 3: Guard Encounter (Speaking Challenge)

5
 Obstacle: The Distraction Expert must talk their way past you (the teacher
acting as a guard).
 Conversation:
o You (as the Guard): “Hey! What are you doing here?”
o Distraction Expert: (Improvises an excuse!)
o You keep asking questions to test their skills.
o If they fail, another teammate must help with a better excuse.

Step 4: The Laser Maze (Physical & Speaking Task)

 Obstacle: The Acrobat must instruct teammates on how to “move” past lasers
(tape/string on floor).
 Speaking Task: Players must only communicate in English while crawling
under or stepping over the “lasers.”
 Extra Challenge: If someone touches a “laser,” they must describe what
happened before retrying.

Step 5: Cracking the Safe (Final Puzzle)

 Obstacle: The Safe Cracker must solve two puzzles before opening the vault.
 Example Puzzle:
o Riddle:: In reply to an inquiry about the animals on his farm, the farmer says:
“I only ever keep sheep, goats and horses. In fact, at the moment they are all
sheep bar three, all goats bar four and all horses bar five.” How many does he
have of each animal?
o Answer: The farmer has three sheep, two goats and one horse. You can
solve this animal riddle with a quick hypothetical. Take sheep: We know
there are three animals that are goats and horses, so we suppose there are
two goats and one horse. Checking this hypothesis gives us three sheep,
which works out because there are four non-goats: three sheep, and one
horse!
o Hidden clue camara footage

Speaking Task: They must explain their thought process before unlocking the
vault.

🔚 Final Decision: Escape or Get Caught?

6
 If they fail more than 3 tasks, the alarm goes off and they get “caught” (fun
role-play).
 If they succeed, they escape with the treasure! 🎉

🎭 Bonus: Improvised Role-Playing Scenarios


If you want more conversation-based moments, here are some optional role-play
interruptions:

🔹 Police Scanner Interruption: “The police are outside! What do we do?” (They must
improvise a solution.)
🔹 Unexpected Alarm: “Oops, the alarm was tripped! Who triggered it?” (They argue
and defend themselves.)
🔹 Lost Equipment: “Oh no, I dropped the hacking device! We need a Plan B!” (They
brainstorm a fix.)

👀 Recap: Why This Works for Speaking Skills

✅ Encourages leadership & decision-making (Mastermind + Hacker)


✅ Boosts improvisation & negotiation skills (Distraction Expert)
✅ Forces clear communication & descriptions (Acrobat)
✅ Encourages problem-solving discussions (Safe Cracker)
✅ Lots of FUN & movement to keep energy high! 🎉

Final Steps for You


🔹 Print role cards & puzzles.
🔹 Prepare tape/strings for the "laser maze."
🔹 Decide on “the vault” (a real locked box, envelope, or hidden prize).
🔹 Prepare your “Guard” lines & unexpected obstacles!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy