Screenwriting ? The Lone Wolf Story Structure Template

Story Structure Templates are the fastest way to write screenplays. One of the most well known and often used templates, which goes beyond three and four act structure, is the Hero's Journey. Arguably, all stories are a variation of this template and the Lone Wolf is one of the most successful of those variations.

The Lone Wolf template is best explained with a combination of Arthurian Legend archetypes as well as Hero's Journey archetypes. A hero journeys to another land to discover the cause behind the death of blood relatives. A battle with Demon Kings, Enemy Knights, betrayal of an Oracle, Mentors, Shape Shifters and a growing set of revelations result in a Final Conflict and eventual catharsis. This hero can also be considered an anti-hero and this template allows for his final death with the inclusion of a Dark Knight.

The Lone Wolf story structure template consists of 56 sequences, which translates to approximately 2 pages per sequence to complete a full length screenplay. The first eleven sequences include:

1) The (developed) Hero interacts with a Demon King (1) and his Queen. There is a deep, forbidden relationship (maybe sexual) between the Hero and Queen, however, the Demon King is unaware of it and would disapprove if he knew. The Queen is uncomfortable with this situation but the Hero must keep it secret or similar, due to his dependent relationship with the Demon King, the Demon King's strength or that the Hero is in fact a Knight in the service of the Demon King.

2) The Hero feels the need to embark on an adventure, to discover the cause of a recent tragic event, where a family member died ? he suspects that the relative was murdered. The Demon King warns the Hero not to embark on the adventure; references to the dangerous nature of the adventure and the land therein; references to the dangerous nature of antagonists he will encounter there; references to the dangerous nature of the hero himself; references to the hero's status. Reasons may be given as to why the Hero must embark on the adventure. The Demon King may forbid the Hero to travel to the adventure; he may not desire relations with that Kingdom jeopardised.

3) Hero journeys to the land of the adventure. En route, we learn more of his character through his behaviour.

4) Hero arrives at the land of the adventure and makes his way to a social arena, usually an inn, which is full of strange and unfamiliar creatures. The (high) status of the Hero in this place is established. The Hero has arranged a meeting with a Mentor, who was familiar with the deceased and the events surrounding the death. However, the Mentor does not appear. The Hero (may communicate with the Mentor) is suspicious and learns somehow that the Mentor is not interested in this interaction.

5) The Hero enters the home or territory of the deceased relative, with special knowledge gained through some past experience. It is a dark and unwelcoming place. The Hero feels he is being watched. He finds a Magical Aid there. There are reminders of the blood relative's death, perhaps even the body of the relative waiting to undergo a death ceremony. The Hero demonstrates empathy and a closeness with the deceased.

6) The Hero finds a Safe Haven, where he meets an Ally (1). The Hero explains the rules and may have to buy the Ally's allegiance.

7) We learn more of the Hero's character through his behaviour.

8) The Hero investigates the death, by asking specialists, to see if it was caused by some foul play. There is no indication of foul play.

9) The Hero meets the close relatives of the deceased ? who are also related to him. The Hero queries them of the circumstances of the death. Indications as to how he died are given.

10) The Hero and the burial ceremony are being watched.

11) The Hero empathises with the relatives of the deceased and offers to provide support. He mentions his plans to marry the Queen, who is of course the property of Demon King (1) ?this also implies a coming conflict between Hero and Demon King (1).

The Hero's Journey and Lone Wolf story structure templates can be found at http://www.managing-creativity.com.

You can also receive a regular, free newsletter by entering your email address at this site.

Kal Bishop, MBA

**********************************

You are free to reproduce this article as long as no changes are made and the author's name and site URL are retained.

Kal Bishop is a management consultant based in London, UK. He has consulted in the visual media and software industries and for clients such as Toshiba and Transport for London. He has led Improv, creativity and innovation workshops, exhibited artwork in San Francisco, Los Angeles and London and written a number of screenplays. He is a passionate traveller. He can be reached on http://www.managing-creativity.com.

weekly home cleaning Highland Park ..
In The News:

Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.

Review In 29 Steps Plus One

I just finished to read a book. A story for... Read More

Hero?s Journey ? The Herald

Beyond three and four act story structure, lies the Hero's... Read More

Linguaphone Language Learning Solutions

Language Training - A key to Global CommunicationLanguage Training is... Read More

Write A Better Newsletter!

You've decided to write your very own Newsletter to promote... Read More

Talent or Toil

As in all endeavors, toil is necessary to succeed and... Read More

Top 10 Common English Goofs by Web Authors

In reviewing and browsing web sites over the years, I... Read More

Stimulate Your Sensebuds...and Wave Goodbye To Writers Cramp!

When you get stuck for ideas, and the words won't... Read More

Self-Examination

Self-examination sheds light on a writers motives, goals, and aspirations,... Read More

Letter Writing Journaling

When you read a letter from someone, we are immediately... Read More

The Myths Of Writing: Have You Bought Into These?

There is an image most people carry of the artist... Read More

Screenwriting ? Five Golden Insights

Originality emerges from structure. Once you have a story idea,... Read More

Could Your Book Idea Be the Next Best Seller?

Everyone has a unique story to tell. From explaining business... Read More

How to Avoid the 11 Biggest Mistakes of First Time Authors

"If you want to change your life," Harry Beckwith wrote... Read More

Write Your Life

Take out a white piece of paper and place it... Read More

Writing the PDA Way

When we think of writing it triggers many thoughts and... Read More

Keep your Book Dream Alive

Is your book nearly finished, finished, published, or even in... Read More

Plotting By Personality - Work With Your Natural Instincts

What's the best way to plot?Quick answer: the best way... Read More

The Value of Adding Images to Technical Documentation

It's clich?, but true-a picture does paint a thousand words.... Read More

Recommendation Letters Demystified

There is a lot of confusion about recommendation letters.Recommendation letters... Read More

The Top Five Mistakes That Companies Make with Regard to Technical Documentation

I've seen it time and again. One of the most... Read More

Writing Is Not Life-threatening

Some writers complain that writing is arduous work requiring long... Read More

Nobody Likes A Rambler

We all know people who ramble. They include every boring... Read More

Overcoming Writers Block

Do you suffer from writer's block? Is there a pending... Read More

Is Your Title Compelling?

Short Story Writing Tips:Your title is your selling tool. It's... Read More

How to Catch the Writing Bug

----------------------------------------------------------Permission is granted for the below article to forward,reprint, distribute,... Read More

whole house cleaning Park Ridge ..