Beyond Castle Wolfenstein Explained

Beyond Castle Wolfenstein
Developer:Muse Software
Publisher:Muse Software
Designer:
  • Eric Ace
  • Frank Svoboda III
  • Silas S. Warner[1]
Series:Wolfenstein
Genre:Stealth, shooter
Modes:Single-player
Platforms:Apple II, Atari 8-bit, Commodore 64, MS-DOS

Beyond Castle Wolfenstein is a 1984 World War II stealth game. A direct sequel to Castle Wolfenstein, it is the second game in the Wolfenstein series, and the last installment to be released by original developer Muse Software before the name was revived for a first-person shooter in 1991. Castle Wolfenstein was written solely by Silas Warner for the Apple II, while the sequel was developed simultaneously for the Apple II and Commodore 64 by Warner, Eric Ace, and Frank Svoboda III.[1] It was quickly ported to the Atari 8-bit computers and MS-DOS.

Gameplay

Like its predecessor, Beyond Castle Wolfenstein is a combination action and adventure game with stealth elements. It is set in World War II during Adolf Hitler's rule as Chancellor of Germany. The objective is to traverse the levels of the secret Berlin bunker where the Führer is holding meetings with his senior staff. The player must retrieve a bomb that operatives have hidden inside the bunker, place it outside the room where Hitler is holding a meeting, and escape before the bomb explodes.

The game shows a top-down view of each room, though the characters are from a side view. The player explores the levels by sneaking by, impersonating, and sometimes killing opponents. The game is controlled via a joystick, paddles, or the keyboard, although the keyboard is the only option that allows for all commands.[2]

The play is similar to its predecessor, but with some updates. The guards use a pass system, in which the player is periodically summoned by guards and asked to show the correct pass (which varies by floor), or offer a bribe. If an incorrect pass is shown or the bribe is rejected due to the lack of money (for a total of two times), the guard will attempt to activate a bunker-wide alarm or kill the player. The bodies of dead guards can be dragged through the room to conceal them, block passages, or gain access to objects. The grenades of the previous game have been replaced with a dagger which can silently kill guards. Upon successful completion of the game, the player is rewarded with a high resolution image of the bunker exploding with the player running away in the foreground.

Reception

Harvey Berstein of Antic wrote in 1985 of the Atari 8-bit version: "while there have been some minor improvements, the game play doesn't provide nearly as much depth as the documentation suggests." He criticized the game for having the same Apple II-like graphics as its predecessor and slow loading speed. He also pointed out, "Once you know which passes to use, you can breeze through the game", discouraging replay.[3]

In January 1985, Computer Entertainer rated the Atari 8-bit version 5½ out of 8 stars.[4]

A 1991 Computer Gaming World survey of strategy and war games gave it two stars out of five.[5]

Reviews

Notes and References

  1. Web site: Hague. James. The Giant List of Classic Game Programmers.
  2. Book: Loguidice. Bill. Barton. Matt. Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All Time. 21 August 2012. CRC Press. 9781136137587. 29 August 2016. en.
  3. News: Beyond Castle Wolfenstein . Antic . May 1985 . 8 January 2015 . Bernstein, Harvey . 83.
  4. Critically Speaking..Atari Computers . Computer Entertainer . January 1985 . 3 . 10 . 152 .
  5. Computer Strategy and Wargames: The 1900-1950 Epoch / Part I (A-L) of an Annotated Paiktography . Computer Gaming World . November 1991 . 18 November 2013 . Brooks, M. Evan . 138.