Welcome home, player!

By clicking Continue with Google or Facebook, you agree to G2Play's Terms & Conditions and Privacy Policy, also to NFT Terms & Conditions and NFT Privacy Policy.

New to G2Play?
Sign up now!
(0 Reviews)
Platform
Steam
Edition
Counter Terrorist Agency Steam CD Key

Counter Terrorist Agency Steam CD Key

Sold by
RoyWin4me
99.57% of 177277 ratings are superb!
$6.58-65%18.73
The reference price is the market price of the same product, at a specific platform where it can be redeemed (e.g. Steam), as of that product's release date. Due to dynamic changes of all digital product prices, which we do not track continously, users are encouraged to check the most recent reference prices before purchase.
3 more offers available starting from
$6.58
Your transaction is secure
We're working hard to protect the security of your payments. We have a dedicated Fraud Prevention and Response Department working 24/7 to ensure safe transactions. We have implemented custom systems to screen out potential scammers and we have partnered with Ravelin, one of the world's best fraud prevention platforms. We don't share your payment details with third-party sellers and we don't sell your information with others.
Key activation
Languages
Release date: 05/12/2019

Join CTA - Counter Terrorist Agency, an international organisation developed to fight terrorism. 

Use modern invigilation techniques, gather information, search for important members of terrorist networks and prevent devastating attacks. Decide who should be spied on and who should be neutralized. Discover Islamic World Caliphate cells all over the world. Fight far-right terrorism in United States and Europe. Uncover hidden truth about dangerous sects planning to take over the world. Some of decisions will be tough, but you have to act surely and quickly. Terrorism never sleeps...

Counter Terrorist Agency is a combination of real-time strategy and manager/simulation game. In CTA your task will be to manage the most modern organization, fight international terrorism, and prevent attacks all over the world. Use modern invigilation techniques, discover connections, listen to suspicious phone calls, read private conversations, interrogate suspects, eliminate threats and dismantle terrorist networks.