AddStringResource("LOCAL:english/Mission 36 Name", "The Launch Pad" );
// Mission descriptions
AddStringResource("LOCAL:english/Mission 02 Desc", "After the attack on the desert outpost, IGI have obtained information on the ConspiracyÆs resources. The terrorists are using an old mineral plant as cover to extract uranium for covert weapons manufacturing. The IGI Operatives need to sabotage the factory network, gather information and destroy the production machines. They have to go through the terrorists to do so." );
AddStringResource("LOCAL:english/Mission 04 Desc", "Following the two Terrorist attacks, IGI intend to neutralise the threat posed by the Conspiracy. The terrorists have constructed a crude military base in the Libyan Desert, which IGI plan to destroy. The IGI Operatives need to sabotage the power generators, hack the ConspiracyÆs network for vital information and destroy any potential air support." );
AddStringResource("LOCAL:english/Mission 05 Desc", "The Conspiracy are launching a Terrorist attack on a top secret US Space Agency research facility in the Nevada desert. They plan to sabotage research on advanced Space Shuttle technology by launching the rocket too early. IGI have intercepted communications detailing the attack, and have despatched a team to prevent the launch.");
AddStringResource("LOCAL:english/Mission 06 Desc", "The Conspiracy are aware of the IGI organisationÆs anti-Terrorist activities. In co-ordination with the attack on a Space research facility, the Conspiracy also plan an assault on an IGI training camp. The camp is defended by SAMs and ground backup forces. The Conspiracy will attempt to destroy the SAM sites and steal classified information - they must be stopped." );
AddStringResource("LOCAL:english/Mission 07 Desc", "Information revealed during operation `Sandstorm┤ has revealed there is a Traitor in the IGI organisation. The ConspiracyÆs headquarters are in an ancient Chinese temple - IGI must discover the identity of the traitor, obtain details on Conspiracy activists and sabotage their data systems." );