32:
194:
The player assumes the role of the special investigator, who must find the
President and the rest of the hostages. The investigator works from his computer terminal, which has access to dossiers of many different individuals such as known terrorists and members of the Cabinet. The investigator also
232:
never ended. The game includes a note telling the player that once they unraveled the game's complex plot, they are to write a report and summarize all of the evidence and send it to Cosmi. In turn, the company would respond to the player.
191:. The terrorists then kidnap the president and the other leaders and hold them hostage. The terrorists leave an audiotape behind, stating that they are Islamic and make numerous demands in exchange for safe release of the hostages.
208:
If the player learned where a hostage or hostages were being held, he could send a special strike team to a particular address. The strike team would then report its findings, which could include other clues.
253:
s premise, plot, and graphics, but criticized its execution. The magazine concluded, "the game has simply too much dead-time to be truly exciting or for players to maintain their initial enthusiasm."
364:
379:
195:
has eight special agents, whom he can send out to interview people or find out information. The agents' reports are then stored on the computer.
384:
374:
359:
217:
339:
228:
As the game went on, it was clear that there was a much wider conspiracy going on. The player had to figure it out. As a game,
198:
The audiotape that comes with the game contains news reports, recorded messages by the
President of the United States and the
394:
202:
while in captivity, intercepted telephone calls, an interview with the First Lady, and intercepts of Morse code messages.
187:
with ten
Western European leaders. Terrorists attack the summit, knocking out the attendees and security personnel with
369:
220:, that could not be accessed without prior authorization. The player, however, could attempt to hack into the files.
389:
354:
349:
163:
in 1988. The game came with an audio cassette with different recordings and an anonymous note signed by "Saduj" (
176:
344:
334:
142:
242:
64:
54:
42:
8:
199:
74:
86:
180:
160:
47:
127:
31:
205:
The game includes tools to decipher Morse code messages and other coded clues.
164:
328:
105:
188:
156:
91:
79:
132:
316:
306:
274:
184:
114:
288:
Wilson, David M. (September 1988). "Non-Resident
President".
155:
is a computer simulation game written by Paul Norman for the
212:
The computer terminal also has two secret files, one by the
213:
365:
Cultural depictions of presidents of the United States
326:
287:
275:"The Giant List of Classic Game Programmers"
281:
268:
266:
380:Video games developed in the United States
30:
263:
175:In the game, which is set in 1996, the
327:
133:Action w/ crime investigation elements
13:
385:Video games scored by Barry Leitch
14:
406:
300:
272:
375:Video games about missing people
311:package, manual and screenshots
360:Crime investigation simulators
177:President of the United States
1:
340:Alternate history video games
256:
223:
395:Video games set in the 1990s
236:
7:
10:
411:
370:Single-player video games
218:National Security Council
138:
126:
97:
85:
73:
63:
53:
41:
29:
24:
318:The President Is Missing
309:The President Is Missing
248:The President Is Missing
230:The President Is Missing
152:The President Is Missing
36:North American cover art
25:The President Is Missing
390:Video games set in 1996
355:Cosmi Corporation games
350:Commodore 64-only games
170:
290:Computer Gaming World
243:Computer Gaming World
200:President of France
345:Commodore 64 games
159:and published by
148:
147:
402:
335:1988 video games
313:from C64Sets.com
294:
293:
285:
279:
278:
270:
252:
179:is attending an
118:
109:
34:
22:
21:
410:
409:
405:
404:
403:
401:
400:
399:
325:
324:
303:
298:
297:
286:
282:
271:
264:
259:
250:
239:
226:
216:and one by the
173:
122:
113:
104:
37:
20:
19:1988 video game
17:
16:1988 video game
12:
11:
5:
408:
398:
397:
392:
387:
382:
377:
372:
367:
362:
357:
352:
347:
342:
337:
323:
322:
314:
302:
301:External links
299:
296:
295:
280:
273:Hague, James.
261:
260:
258:
255:
238:
235:
225:
222:
172:
169:
146:
145:
140:
136:
135:
130:
124:
123:
121:
120:
111:
101:
99:
95:
94:
89:
83:
82:
77:
71:
70:
67:
61:
60:
57:
51:
50:
45:
39:
38:
35:
27:
26:
18:
15:
9:
6:
4:
3:
2:
407:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
371:
368:
366:
363:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
336:
333:
332:
330:
320:
319:
315:
312:
310:
305:
304:
292:. p. 22.
291:
284:
276:
269:
267:
262:
254:
249:
245:
244:
234:
231:
221:
219:
215:
210:
206:
203:
201:
196:
192:
190:
186:
182:
178:
168:
167:in reverse).
166:
162:
158:
154:
153:
144:
143:Single player
141:
137:
134:
131:
129:
125:
116:
112:
107:
103:
102:
100:
96:
93:
90:
88:
84:
81:
78:
76:
72:
68:
66:
65:Programmer(s)
62:
58:
56:
52:
49:
46:
44:
40:
33:
28:
23:
317:
308:
289:
283:
247:
241:
240:
229:
227:
211:
207:
204:
197:
193:
189:sleeping gas
174:
157:Commodore 64
151:
150:
149:
92:Commodore 64
80:Barry Leitch
55:Publisher(s)
43:Developer(s)
321:at Lemon 64
181:anti-terror
87:Platform(s)
75:Composer(s)
69:Paul Norman
329:Categories
307:Images of
257:References
246:applauded
224:Resolution
183:summit in
237:Reception
128:Genre(s)
139:Mode(s)
98:Release
185:Europe
251:'
165:Judas
161:Cosmi
59:Cosmi
48:Cosmi
171:Plot
119:1988
110:1988
214:CIA
331::
265:^
115:EU
106:NA
277:.
117::
108::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.