|
A Brief Note |
I've been trying to write a guide for The Society of Linian Studies, but for some reason, it's just not working for me. Maybe because, despite it's huge amount of content, it's actually pretty easy to follow. Unlike this game. I've gone through and read all the post in the DarkNet forums and I still don't understand how half of the things were discovered and/or figured out. I'm hoping by writing this, things will start to make a little more sense. For me and for everything else.
|
|
|
Exoriare |
To get started with Exoriare, the first thing to do is to read the first part of the graphic novel, written by Douglas Rushkoff.
The story starts out following three men in Malta in 1995, the Lieutenant, the Sergeant and Samson, a linguist. They are assigned by the US Army to check out an old munitions cache hidden in an ancient temple after an earthquake. The three men and their guide, Pahana, get spooked while in the temple and hastily retreat after Samson is injured. After exiting the temple, the men are confronted by an armed group led by an unnamed gray-haired man, who informs them that the US Army has no authority to be entering the temple.
Recovering from his wounds, Samson tells his comrades stories that he has heard about the temple - stories involving people disappearing or seeing strange things. The Lieutenant tries to play it off as toxic gas causing hallucinations, but Samson will have none of it. He decides to go back to the temple, alone, and is never seen again. It's assumed that he is killed by the armed group and his empty casket is buried in Denver, CO as his daughter, Claire, looks on.
Jump ahead to 2011. Claire is in school in Boulder, CO, following her father's footsteps by learning linguistics. Although she doesn't seem to get along with her professor, some of her classmates have been having extra meetings with him. One of her classmates, Todd, is asked by Professor Peer to help someone access 'the networks' stating that "Things are happening. People are finding more things than they can hide."
Meanwhile, in Fort Irwin, the Lieutenant, now a Colonel, and the Sergeant, named Anthony, are getting ready to run some sort of test on some "foreign" equipment. The test activates a beam, which in turns causes a number of UFOs hovering over Los Angeles to suddenly become visible. After declaring to his men that the test never took place, the Colonel and Anthony talk about how Samson had been right all along.
So now that you know aliens are aliens are watching Earth, it's time to jump in and join the fight against them. Because aliens are always evil, I guess. Setting themselves up in government agencies, like the FBI, years before the rest of the aliens reveal themselves to everyone on the planet. And then when their partner tries to get information on an (alien) terrorist cell, the alien FBI guy try to kill her. But he fails and she stabs a big piece of metal through his chest, but not until after she sees his alien skin underneath his very cute human exterior. Oh wait, I'm getting this confused with V. Common mistake, right?
Okay, joining the fight against these evil aliens! On page 13 of the graphic novel, you might have noticed that one of the computer screens in last panel is actually animated. That is your portal into the DarkNet, the network that Professor Peer seems to be talking about a few panels before. Clicking on the computer screen whisks you away to a maze that will lead you to the DarkNet.
|
|
|
White.House |
In order to access the DarkNet, you have to navigate a Zork-like program called White.House. Your goal is find a red button and push it. There are three available: "One's almost buried. One's in the house. One's been forgotten. One's all that's needed." The quickest button to get is the buried one, but it doesn't hurt anything to explore the area fully. There's also the added bonus that if you do something really bad, you just get redeposited back at the beginning, so no worries there.
§
You are standing in an open field west of a white house, with a boarded front door. There is a small mailbox here.
> north
There is a large columned ruin of a building, with a step pyramid for a roof. An iguana is buried beneath a piece of rubble.
> look at iguana
The iguana is dead, crushed by the fallen piece of masonry. Beneath it you find a red button protruding from the ground.
> press button
If you do this, there is no going back. We've located the trace on you. We can disable it. You can be free. But once you see what once was, you will never see the future in the same way again. Are you sure you want to learn the truth?
> yes
You feel a massive vibration welling up in the ground beneath your feet. Looking up, you see the roof of the temple shuddering as the harmonic resonates.
You may notice that as you first start out, the game keeps typing out "Open Mailbox" for you. If you open the mailbox, you'll get the text of the Declaration of Independence overlayed on the screen. Eventually it fades out, but as it fades, you'll notice that some of the words don't fade out as quickly. These words tell you exactly what is going on.
§
When people assume the powers of God, mankind requires the truth. Aliens are among men, deriving powers from Governments long established. They alter history and direct the establishment of an absolute tyranny over this world.
See, aliens are evil. The mysterious letter in the mysterious mailbox in the mysterious computer program told you so.
Some other fun things to type while in the White.House program: nasa, waterfall, inventory
|
|
|
GeneHack |
Once you have successfully pressed the button, you are deposited into the GeneHack program.
§
Maincore Genetic Library - Override Access Point
This tool is provided for use only by individuals w. Mk Classification Ult*a or higher.
Warning: Genetic record mod renders all Ech Tier Tracking inoperative.
Assemble the required DNA sequence from your pool of silencer DNA.
Use the acid brush to burn off incompatible sequences.
This is a time sensitive process.
You are required to recreate the DNA sample on the left using the bits and pieces you find with your scanner. There are two trays where you can deposit the DNA fragments: the main tray where the actual assembly will take place and a storage tray where you can keep fragments for later. There's also a acid brush which will allow you to burn off one section of the strand at a time, to fix errors or make the fragments fit together.
The instructions say that this is a time sensitive process, but there is no penalty for failure. In fact, you actually get more time as you fail, so if you're having problems completing it, just allow your current session to fail and start again with more time.
After successfully completing the gene hack, you'll hear a voice saying that the DNA records have been updated. You can now register for access to the DarkNet.
By the way, I know that some people have been having serious problems successfully completing this and thus progressing to the next stage. If you really cannot complete the GeneHack, friend me and send me a message on Twitter and I'll complete the GeneHack (and the one later in the game) and DM you the username and password. That way you won't be left out of the fun.
|
|
|
Registration |
The registration page tells you that "You are now untraceable via Echelon/Mainframe Tier. Registration is virtually painless - just type in the CAPTCHA letters and you are given a username and password. You can change your password once you're on the forums and even set up an email in case you forget, but you will be required to remember your username in order to login under the same account each time. It's now time to enter the DarkNet.
|
|
|
The DarkNet |
The first time you enter the DarkNet, you are greeted by the OLD.BKS message, which promises that your questions will disappear if you just hang in there long enough.
§
This message is for the sender old books and photographs. I know now. I know what they're afraid of. When the world sees the truth, they will lose everything. All their work. Everything.
I'm ready to work with you. I'm ready to share everything I have. In order to do this, we have to move quickly. I don't know how much longer I can keep this up for. You know the location. Five steps down. Five steps up. The key is rotting.
682, twenty-three, 615, 7 sixty-seven.
When you've seen what I've seen, all your questions will disappear.
Once that oh so cryptic, let's raise more questions than we answer, message is over with, you can finally start playing around in the DarkNet. In the beginning, you can only access a few bits of it, but as you complete certain tasks, more things will become available to you.
Right now, you have the following parts of the DarkNet available:
- D.MUX.R - a program to listen in on radio conversations
- FOR.UMS - the DarkNet forums
- OLD.BKS - the Old Books message
- A.TCK.DG - a program that allows you to exploit specific web addresses
- ECH.LON - a program that scans cities for voiceprint matches
|
|
|
The Forums FAQ |
You may or may not want to check out the Forums first. The players have posted most of what they've found, although it can be a little haphazard going through it, and it's not always clear as to how they got from point A to point B. However, the FAQ section of the Forums has some pretty interesting reading on what the DarkNet is and what you've experienced so far.
§
What is the DarkNet?
The DarkNet is a secure communications network that can survive multiple types of attacks. The DarkNet must be accessed by a gateway – temporary access points provided via shortwave, packet radio, internet websites, or custom handheld devices. Gateways may disappear or be shutdown at any time, but the underlying DarkNet persists.
What is the Darknet's purpose?
We use the DarkNet to communicate on sensitive issues that tend to attract the wrong type of attention. It also hosts several tools that we have developed or salvaged to further our work. There are many things that we do not yet fully understand. As we come across these new developments, they will be posted here, for all who have eyes to see. If you know about or see something that is not reported here, please post it, even if it doesn't seem to make sense. It is only when we bring all the pieces together that the truth will become inescapable.
What is the White.House about?
Many countries routinely monitor all communications, via what is referred to as ECHELON-tier systems. Active surveillance is not permitted when accessing the DarkNet, so the tracking system must be disabled before you can be granted access. To deactivate these systems, a biometric profile is constructed based on some of your neuromotor characteristics (idiosyncrasies in how you type). On its own, this profile is not sufficiently unique to track you, but there may be several people at your house or business, and your profile is unique enough to tell when you are typing, vs a family member or co-worker. Once your profile has been found, we can use it to isolate your primary record. This is unique, and is most often based on genetic material. Once we locate your primary, it is up to you to modify it. By doing this, you prevent all secondary surveillance systems from tracing back to you – the tracking systems still work, but they can’t “link up” with your identity. At this point, you are effectively anonymous, and can be given DarkNet Access.
Why do I have to modify my DNA? Isn't this dangerous?
You’re simply modifying your genetic trace record as it exists within the Maincore Genetic Library – this does not involve any modification to your own DNA. Your primary, genetic record is what all other surveillance and tracking systems are bound to. By altering the genetic record, you make it impossible for any other surveillance systems to identify exactly who they are tracking.
What is MAINCORE?
MAINCORE has evolved into the central records repository for ECHELON-tier mass-surveillance systems. These surveillance systems are integrated into communications and electronic payment systems throughout North America, Europe, as well as Australia. Very rarely, we will find somebody who doesn't have a record in MAINCORE, but the system is widely considered to have reached a state of TIA (Total Information Awareness, aka 100% surveillance).
Is MAINCORE everywhere?
Southern Asia, Africa and much of South America lacks any local ECHELON infrastructure, but any international or satellite-based comms, even in these area, must be considered to be BLACK ECHO.
What should I report?
People are sometimes reluctant to post something they've seen, because it was "probably nothing". Do not worry about this – we have a triage process to filter out "weather balloons" or legitimate movements of troops. We've found camps because somebody happened to post about a strange convoy passing through a rural area in the middle of the night. We've found weapons systems capable of "pacifying" entire cities, all because somebody took the time to report.
What is the D.MUX.R?
A lot of demuxer content consists of hijacked intercepts of various communications networks: everything from police and ambulance radio networks, military comms, cell-phones, or traditional “bugs”. Sometimes, a group that is “working the surveillance” will hit a dead-end. They will post their current findings in the demuxer, and share their frequency/channel list with those that they think will be able to help. If you do not receive a frequency/channel list, you still have access to all of the data, but you will need to post your findings in the forums.
How do I use ECH.LON?
Echelon is a mass-population surveillance system that tracks people by using a combination of voice-prints and keywords. (A voiceprint is a unique record for an individual, similar to a fingerprint, but based on recordings of their voice). We have minimal access to a backdoor in ECHELON. With a voice sample from somebody, and a city name, we can access the last communication that ECHELON detected from that person in that city. This can sometimes help us find people that have disappeared. To use the interface, just load in a voice sample, then enter the name of a city where your target may have been.
How secure is the DarkNet? Can anybody access it?
Every day, agents of co-opted governments and private groups attempt to access the darknet. The more that they are denied access, the harder they work to obtain it. Our current approach is to provide these groups with their own “darknet” – one that is indistinguishable from the real thing – except for the fact that it contains only misinformation).
Even though it's not one of the links in the DarkNet, you should also be aware of the Wiki that has been set up by the players: http://exoriare.wikia.com/wiki/Exoriare_Wiki There's a lot of great reference information in it, so you should at least glance through it just to see all the small little connections between bits and pieces of this game. It really makes you appreciate the detail that went into this game.
Now that we have a basic idea of what we're dealing with, it's time to start playing around on the DarkNet. We'll start out with ECH.LON because that will give us the best base to deal with the other programs.
|
|
|
ECH.LON |
In case you missed it in the FAQ, "Echelon is a mass-population surveillance system that tracks people by using a combination of voice-prints and keywords." All you need is a voice sample and a possible city they were in, and it will try to track down the last communication it picked up from that person.
To get started, click ECH.LON on the DarkNet, make sure the aud-vox-raw.bin file is selected and click Load. This will bring up a screen where you can see the data record of a Dr. Gideon Marconi and a search box that will check specified cities for his voice print.
§
Name: Marconi, Gideon, Dr.
Fusion Center: CA-12
Active Flags: NSAP, FORINT, JPL
Key-Matches (Last 30): Sat(80) / Payload(45) / Delivery System(43) / Launch (28)
Pending Action: NSAP (Inducted) ** SREP Notify (UK Liaison)
For most cities that you put in, you'll either get an error stating "Search criteria must be refined. City exceeds maximum number of entities." or "0 matches for this location. (ECH TIER)". So our first mission is to figure out a city that Gideon would have been in.
Looking at his profile, you can see he has three active flags: NSAP, FORINT, JPL. NSAP is more than likely the National Scientific Advisory Program, FORINT I'm guessing is Foreign Intelligence, and JPL is the Jet Propulsion Laboratory, which is located in Pasadena, California. Entering "Pasadena" into the search field gets us our first hit.
You'll notice a blue bar light up at the bottom of the screen. Clicking this will bring up the file TCM-MCR-ECH-TC-REF(9B)+5263C0 and allow you to hear a conversation between Gideon and an unknown gentleman.
§
Unknown: So, we have a problem.
Gideon: How did you get this number? It's not even my phone.
Unknown: A little mentor covets all you do.
Gideon: Great. You know the police are outside of my house. They're calling it treason. You've got no idea how much trouble you've gotten me into.
Unknown: I showed you the truth. Others have found that to be a great gift.
Gideon: I'm not talking about your gifts. I tried to help you and you burned me. They think it was me. Why would you log in with my account?
Unknown: Calm down. You're in danger. But not from any police. I can save you, Gideon, but first I need the access codes. Don't lose sight of what's truly important. You can change history.
Gideon: You don't get it, do you? The codes are useless. I'm completely cut off. I can't work. I can't leave the country. If you want these codes, you tell me how I can fix this.
Unknown: I will tell you this much. You need to hammer the bracelet. That will at least get the police off your trail.
Gideon: That's with the obelisk, right?
Unknown: I'm impressed. You decoded the book.
Gideon: Enough of that. Where do I go?
Unknown: You cannot enter the City of the Gods. They consider you a criminal. Unclean.
Gideon: How many orbits?
Unknown: Six. They count inwards.
Unknown: But you don't know... *click* Hello?
File Information
§
Record Primary: Marconi, Gideon, Dr.
Record Type: Maincore Provenance (ECH TIER)
Record Status: Current (Last 30)
Voiceprint Match: 237
Voiceprint Match Confid: [50%]
Pers. Profile: Classified(NSAP status pending)
Flags: JPL, NSAP, FORINT
Additional info in Archive
unmatched identities: 1
Original Record Source; SIGINT(MAINFRAME)
Signal Source: Telecom/Echelon
Somewhat of a strange call. We know that Gideon is being investigated for treason and now he can't even leave the country. As for what the bracelet, obelisk, City of the Gods or orbits means, we have no idea. At least not yet. Since we can learn nothing more in ECH.LON for now, we have to check somewhere else.
|
|
|
A.TCK.DG |
A.TCK.DG allows you to remotely access specific websites, provided they are susceptible to exploits.
To get started, however, you do need an IP address. Although we haven't been given an usable addresses, we have been given the information on how to obtain one.
At the end of the Old Books message, there was a series of numbers given to us: "682, twenty-three, 615, 7 sixty-seven." We were also told "Five steps down. Five steps up. The key is rotting." In order to get a usable IP address out of 682.23.615.767 we need to either subtract or add 5 to each of the digits.
§
682.23.615.767
555.55.555.555
137.78.160.212
We now have a usable IP address to input into A.TCK.DG: 137.78.160.212
Open up A.TCK.DG, enter the IP 137.78.160.212 then Scan for exploits. This will take a few moments to complete. You'll be informed that an exploit has been found for JPL.NASA.GOV.
§
System: JPL.NASA.GOV
User: Multiple Present
Networks: TCPIP/IP, MCN/ECH
Surveillance: MCN/ECH active trace to NSA (MEADE)
Exploits Active: NONE
Now you're ready to launch the exploit. In order to launch it correctly, you have to input the order correctly, otherwise it will fail.
§
1. Create Socket
2. Define Login
3. Send Login
4. Receive Reply
5. Execute
Once the sequence is completed, the exploit will launch and a connection will be established. You are now connected to the JPL server. However, because you are connected outside of the DarkNet, you are susceptible to being traced. If the trace gets too close to finding you, your connection will be terminated, so you have to make good use of your time.
|
|
|
NASA Server |
You're now in Gideon's directory on the NASA Server. Most of the functions don't work since they have been transferred to the authority of FEMA, but the Transfer/Backup all files command works. There are 8 available files and 5 deleted files. You need to download as many of these files as possible. This is easier said than done because as soon as you start downloading, the remote computer starts to trace your connection.
A chat window will pop up and start to ask you a series of questions. The initial questions vary, and if you answer any of them incorrectly, you'll find your connection being terminated after you've downloaded only two files: Some.Of.Four.Primes.Carriers and CLEO(patched).
However, if you answer the first questions correctly, you are then asked another series of questions. If you pretend to be Gideon, you'll be able to progress farther in your downloading efforts. There are variations on some of the questions, but they still require the same input. Don't worry too much now about getting a question wrong. You can keep going back into the NASA server and trying again, just as long as you DO NOT complete the GeneHack that shows up in the DarkNet after you get kicked out of A.TCK.DG. [UPDATE: It now seems that the A.TCK.DG lockout might not happen for new users, so that's good news.]
§
Are you authorized to be transferring those files?
> yes
Okay. I will tell you what is strange. Your internet address is not on my "whitelist". Are you working from a remote slash offsite location?
> yes
That is perfectly fine. I will only need to update my "whitelist". I need to show you are approved. Tell me the first letter of your name, so I know where to file your approval.
> g
Gideon?
> yes
When we last spoke, you had found a needle. Who did it belong to?
> cleopatra
And how many letters are in the letter?
Unless you get a lucky guess, your cover as Gideon will be blown on the letter question. But that's okay, because you got enough downloaded to figure out what the next answer.
|
|
|
Pahana |
When you get kicked out of A.TCK.DG, you'll hear a voice talking telling you that your network has been compromised. It's the same voice that was in the Pasadena ECH.LON file talking to Gideon.
§
Keep looking for old books and photographs. I traced you here through your machine, but I am not alone. They were watching you at John Parson's lab. Your network is compromised beyond all redemption. I could help you build something far greater. The DarkNet that reaches into the old hiding places where the truth itself is concealed. Your security system denies me access. Help me. Let me in. I am not anonymous. I am Pahana.
Pahana? The tour guide from the desert temple in Malta? What is he doing tracing our connection and getting into the DarkNet? That's a mystery for another time, I guess. Right now, we're going to ignore his request for help. By helping him (via GeneHack2) we end up locking ourselves out of the NASA server, and we don't want that right now.
|
|
|
Gideon's Directory |
Instead, check out one of the other new points in the DarkNet: GID.DIR. This allows you to see the files that have been downloaded via A.TCK.DG. You'll see you actually got five files: Some.Of.Four.Primes.Carriers, Four.Prime.Carriers(PRINT), CLEO, NTRNL and TQT.
The Some.Of.Four.Primes lets you spin around a wheel and match up writing that has been found in the Voynich Manuscript. If you click in the very center of the wheel, the inner most ring will switch between Voynich letters and Latin. The Four.Prime.Carriers(PRINT) is printable image of the same wheel, except the innermost wheel only has the Latin letters. CLEO scrolls through a series of pictures: a ruined temple, a map, wall drawings, a submarine, and a picture of the constellation Leo. NTRNL and TQT both have more writing from the Voynich Manuscript.
So how do we figure out how many letters are in the letter? The question is asking how many unique characters there are in the NTRNL file. There are a couple of ways to figure this out. The most obvious is just to count what you see in the NTRNL file, but that can be pretty annoying trying to make sure that you didn't miss one. The easier way is to count the number of characters there are in the second ring of Four.Primes, since that contains all of the same unique characters as is in NTRNL (since it can be used to decode Voynich letters into Latin letters). There also seems to be a third confirmation of the number - by adding the first set of handwritten numbers on the bottom of NTRNL (sum the four primes). Whatever way you do it, the answer you need is 17.
|
|
|
NTRNL file |
Since we are already looking at Some.Of.Four.Primes and NTRNL files, we might as well use them together to figure out what NTRNL is saying. First, take a look at the TQT file. There are 20 "words" paired up on the page, although most of them are crossed out. What you want to look at are the uncrossed pairs one at a time.
On Four.Primes, you need to find the upper word on the outer ring and the lower word on the inner ring and match them up. Now you need to rotate both rings together until all of the consonants in the inner ring are unique. Clicking out beyond the outer ring will rotate both rings together. If you lined up the words at the bottom of the screen, you will need to rotate the wheel 11 spaces clockwise to have the wheel in the correct position and will be able to match up the Voynich letters to their Latin counterparts. Now you can decode the first paragraph of NTRNL. To decode the other two paragraphs, match up the other symbols on TQT and repeat the process.
§
ths wrds stnd bfr thr qrts s prvsly sgnfd x w r ndvdd n
r qndmntn f th btryr g x r bhst nd yr dvtn ths ntwnd
ths lttr nd ths dspt shll b dlvrd t th brnng pyr nd n mr
spqn f x pn s th shrp wght f tm prsss
n qqrdns wth yr dmnds g lvs stll thgh dth by ny stndrd f
gdgmnt s dsrvd x y gv hm fvrd trtmnt yt w qnsdr hm btwn
tlrns nd qntmpt x yr sntmnts r prplxng x y mst nt frgt
yrslf x y prtqlrly ndrstnd bng n ll sds brdrd by drgns x th
qsp f dstny s n tm fr msrs t b hlvd
t g mny gfts hv bn gvn x lwly mn rsd t grt mprtns wth
n whp shpng hs mnnrs s wld dg lft t snff vrythng bt hvng
n mstr x h mst b srrndrd r thrgh th qrsbl pss x w dmnd
ths trsn b rvld fr ll t s x n ths qmmnd s ll thngs w r
brthrn
There's one more step to complete since it's still somewhat gibberish. That's because the codewheel didn't provide any vowels, C's, J's, K's or punctuation. So you need to add or change some letters to get it into a readable condition.
§
These words stand before three courts as previously signified. We are undivided in
our condemnation of the betrayer G. Our behest and your devotion thus entwined
this letter and this despot shall be delivered to the burning pyre and no more
spoken of. Open as the sharp weight of time presses
In accordance with your demands G lives still though death by any standard of
judgement is deserved. You give him favored treatment yet we consider him between
tolerance and contempt. Your sentiments are perplexing. You must not forget
yourself. You particularly understand being on all sides bordered by dragons. The
cusp of destiny is no time for measures to be halved
To G many gifts have been given. A lowly man raised to great importance with
no whip shaping his manners is wild dog left to sniff everything but having
no master. He must be surrendered or through the crucible pass. We demand
this treason be revealed for all to see. In this command is all things we are
brethren.
Wow, someone is really unhappy with G - who is probably Gideon since that's the only G we know so far and in his own words he is considered a traitor by some.
|
|
|
NASA Server, Try Two |
Since we know how many letters (unique Voynich letters) are in the letter (NTRNL), let's see if we can get any farther into ATK.DG. §
And how many letters are in the letter?
> 17
They may be watching me, I believe. Be careful what you say. Are you safe?
> yes
I would like to meet. Do you think that we can meet?
> yes
You are a strange man. I was able to recover several files here. Not what I was looking for. What is the first access code?
You are strange to me. Who are you? And what is this "darknet"?
That didn't get us very far. And since we didn't hear Gideon give out the access codes on the Pasadena conversation, we can't give them out here. Although, it's hard to say if we would be confirming the access codes or just giving them to Pahana. Maybe there is another way to get information out the NASA server.
|
|
|
Not Gideon |
What if we tried to pretend we were someone other than Gideon? Would that allow us to do anything else?
§
Tell me the first letter of your name, so I know where to file your approval.
> j
Okay, my work is done, I'm sure you will have much to do, with of all the changes. I will move out of your way. Goodbye.
> goodbye
I wonder. you may be able to assist me with some matter. what mission are you currently assigned to?
That is not familiar to me.
Well, that didn't get us very far. But at least now we have two things that could help us possibly progress on the file downloads: Gideon's access codes and a Mission name.
|
|
|
Second ECH.LON City |
Luckily, there's still a lot of information we haven't accessed yet that can hopefully provide us with the information we're looking for. It seems that there should be more ECH.LON files on Gideon if we just knew where to look. We know he had recently seen Cleopatra's Needle. There are three obelisks that are referred to as Cleopatra's Needle: in Paris, London, and New York City. Since Gideon supposedly can't leave the country, we might as well try to see if he went to Cleopatra's Needle in New York City.
This is where playing with ECH.LON gets a tad annoying. Typing in New York will tell you that the search criteria must be refined. But typing in New York City will net you zero results. So it would almost appear as if NYC isn't the correct location we're looking for. But technically it is. The obelisk is located in Central Park, which is in Manhattan, which is a borough of New York City. So we need to answer Manhattan for the second city (entering Central Park gives back an unrelated lookup).
§
Pahana: A friendly warning - they rounded up your entire team at NASA. Will they find the back door?
Gideon: They'll find it, but they can't disable it. Not without a shuttle mission.
Pahana: What happened?
Gideon: I went to the obelisk. The needle. I walked around it. Nobody approached me. Nobody talked to me. Nothing happened. I started to think maybe this was all some sort of elaborate scam. I went to the police and turned myself in.
Pahana: Gideon...
Gideon: No charges. No warrants. The police aren't looking for me. According to their records they never were. I'm not on any watch list.
Pahana: The police were never any threat. It does not mean that you are safe. Gideon, either you help yourself now or you help everyone but yourself. You understand? You have a choice to make.
Gideon: Yeah, I'm the emperor of ice cream. Tell me, how would i save myself, if that's what I chose?
Pahana: If you make your peace with them, you will make enemies of us. You cannot deceive them.
Gideon: Tell me!
Pahana: In one of their cities, you have a backer among them. A friend. A supporter. Do you know who this is?
Gideon: No.
Pahana: You would have first met him when you were still a child. He would have presented himself as a distant relative or an old family friend. How do I access the satellite?
Gideon: Cats see things. When would I last seen him?
Pahana: They liked to show up for special days. Graduations, weddings, births. He got you your job. How do I take control?
Gideon: There's a global network of ground stations. One of them always has line of sight. As it orbits the satellite switches between these stations. That's your window, the hand-off. That's when you need to seize it. How do I find him?
Pahana: The letter I gave you, it was meant for him. What do I need to build my own ground network?
Gideon: One ground station isn't enough. As soon as you lost the line of sight, they'd seize control. You need relay satellites around the entire planet. You would need a ground network to control the relays. It would be impossible. The letter. What does the letter tell me about him?
Pahana: It tells you where he lives. It tells you what he sees. I may know of a group that can help. We can build the network. Gideon, the access codes.
Gideon: Are they listening?
Pahana: Almost certainly.
Gideon: Then they'll know I told you nothing.
File Information
§
Record Primary: Marconi, Gideon, Dr.
Record Type: Maincore Provenance (ECH TIER)
Record Status: Current (Last 30)
Voiceprint Match: 237
Voiceprint Match Confid: [50%]
Pers. Profile: Classified(NSAP status pending)
Flags: NSAP, FORINT
Additional info in Archive
unmatched identities: 1
Original Record Source; SIGINT(MAINFRAME)
Signal Source: Telecom/Echelon
Well, it doesn't look like we're going to get the access codes from Gideon any time soon. But maybe now that he knows he's not on a watch list, he can travel outside of the country and maybe he'll check out one of the other obelisks.
|
|
|
Third ECH.LON City |
There's one other thing you have to know about entering cities into ECH.LON - you have to enter them in the correct order. If you try to enter Manhattan before Pasadena, it will show up with zero results. Since it seems that the Manhattan conversation takes place after Pasadena, an unknown (but not insignificant) amount of time passes from when you enter one city to the other. Either that or Gideon has a transporter that he can just whisk around the world with.
Pahana says that there is a location in the letter that Gideon has, presumably the NTRNL letter. There is nothing specifically mentioned, so either it has something to do with the handwritten numbers on the bottom of the page, or it's obfuscated in the text. Of course, we don't even know if the city in the letter is the next place Gideon went. But we do have other clues.
As I said before, there are three obelisks that are known as Cleopatra's Needle. We know that Gideon visited the NYC needle. The twin of that needle is located in London in the City of Westminster. Add in the fact that there is an SREP NOTIFY for the UK Liaison attached to his profile, and it seems like it might be a good bet that's where he went. Except that neither London or City of Westminster work. However, the City of Westminster borders the City of London, a Square Mile in the heart of London that has its main boundaries marked by Dragon statues. And this is the third city that Gideon visited.
§
*dial tone*
Gideon: I've got no way to contact you. But what I have to say will wait. Because of you I may not have much of a later. I've chosen and I want you to know - I'm going to burn you.
Automated voice: Please hang up. Please hang up.
Gideon: I'm gonna do everything I can to destroy you. You kept me in the dark, you manipulated me, you fed me lies and half-truths. You spread poison and call it justice. You claim to be a king but you're no more than a waterboy. This doesn't end here, and it doesn't end with me. *hangs up*
Unknown Man: You need help for that anger. Perhaps we might provide it. It's time for you to come in.
File Information
§
Record Primary: Marconi, Gideon, Dr.
Record Type: Maincore Provenance (ECH TIER)
Record Status: Current (Last 30)
Voiceprint Match: 237
Voiceprint Match Confid: [50%]
Pers. Profile: Classified(NSAP status pending)
Flags: NSAP, FORINT
Additional info in Archive
unmatched identities: 1
Original Record Source; SIGINT(MAINFRAME)
Signal Source: Telecom/Echelon
Well, it seems that Gideon knows how the Echelon program works. He doesn't even have to call anyone, just pick up a phone and talk into it and his message will get to the people tracking him. However, it doesn't seem to make a lot of sense to try to talk to Gideon after he's hung up the phone.
Unfortunately, the London message didn't really give us a clue as to where Gideon could be headed next. Place de la Concorde, the location of the last obelisk, doesn't give us any results, so that's out. And since we still don't have the access codes or a mission name, we can't progress any further on A.TCK.DG. But there is one entire section (not counting GNE.HCK) that we haven't looked at yet - D.MUX.R
|
|
|
D.MUX.R |
D.MUX.R is a bunch of hijacked intercepts of various communications networks that are bundled together under different channels. You can load up to four different channels on the demuxer interface at once. Once a channel is loaded, you can adjust the frequency of the sound band anywhere from 0 to 180. There's also a volume control with a small button on the side of the channel that will effectively mute the channel without having to switch directly to it.
The interesting thing about the various channels in D.MUX.R is that they often overlap each other. You might hear one part of a conversation on one frequency and channel while the other half is on entirely different channel and frequency. While it's time consuming to go through each frequency on each channel, there is a huge amount of information to be had, so there's a big payoff.
If you first visited D.MUX.R when you entered the DarkNet, there would have been four channels available to you: DUGA-@, 0xff-e, BCK_DR, and GW5N. Once you unlocked the Manhattan intercept, four more channels became available: fe-13, ECCM(D, 1OL-A1, GW66N. It also seems that other intercepts are added to the previous channels, so you're going to have to make sure you go back and rescan the channels as more is discovered via ECH.LON
Because the of the way the intercepts loop, it can be a bit difficult to find some of them as you scan the sound bands. Most of the intercepts have quite a bit of dead air, and if you hit a dead air patch as you're scanning, you might not stick around long enough to hear anything. However, the intercepts do cover a range of frequencies, so you don't have to worry about picking the exact frequency number to hear a particular intercept.
Due to the huge amount of information that the D.MUX.R channels have, they have their own dedicated page with the different audio syncs listed separately.
|
|
|
NASA Server, Try Three |
Hopefully after listening to all of the intercepts on ECH.LON, we have enough information to answer the questions that will come on A.TCK.DOG.
§
I wonder. You may be able to assist me with some matter. What mission are you currently assigned to?
> altar skies
Yes, I am very familiar with that project. Are you currently using any ground network assets?
> yes
What station?
Well, that didn't get us much further.
Okay, here is where we run into a major problem. The next question asked to progress the file download asks for a ground station name. Unfortunately, at this particular point, I can't find where a ground station name is available to us to use - either because there isn't one, or I just haven't found it yet. You do a ground station name after you complete GNE.HCK2, but this ends up technically locking you out of the A.TCK.DG exploit. Obviously you could get back in by creating a new profile (or realize you can bypass A.TCK.DG and access the NASA server directly), but that seems like a bit of a cheat to me despite the fact that this is how it was solved to begin with. Unless the idea is that you would be able to contact other people in the DarkNet with access to the ground file names and acquire the information that way, but that still seems inelegant.
So we're left with a dilemma: continue on without getting the last files, or use the knowledge in the forums to progress. Since there's still a ton of information left in Gideon's directory (that actually seems to be referenced in the D.MUX.R intercepts), we're going to cheat a bit and grab the files.
By the way, if you happen to figure out where you could acquire a ground station name before you complete GNE.HCK2 or what Gideon's access codes are (it's hinted in GW66N:62 and DUGA-@:133 that it can be worked out from Gideon's interrogation in
GW5N:133 and 10L-A11:91), please let me know. I would love to be able to update this section with a 'correct' process rather than this work around.
§
What station?
> poker flat
We've had security problems with that station. What's your login name, I'll check if you're affected?
> (your darknet username)
I was afraid of that. Your account is flagged. Do you have your access card on you right now?
> yes
{You have recovered an enigmatic satellite photo. You have gained status: Exploit Engineer}
Okay, fortunately I can get you a new one right away. Are you on campus?
> yes
That's funny. I thought we already established that you are offsite. I show you as being in Willingsboro. I'll have your card couriered to you. What is your address?
> 1 Main Street
{You have bypassed all security. You have gained status: Social Engineer}
Actually, never mind. I have everything I need.
Hooray! That one ground station name basically netted us three additional files considering the ease of subsequent questions: DPR.Image-23571113, P.Field.Notes and V.M. Pages. You should now have a total of 8 files in GID.DIR.
|
|
|
GNE.HCK2 |
Since we've seemingly got all we can out of the NASA server, it's now time to Pahana into the DarkNet so that he can help us since we've been completely comprised. We need to modify his MAINCORE DNA profile so that it is unable to track him. When you enter GNE.HCK, you get a message that says "We cannot protect everybody. Make a choice." and can either continue or abort (just in case you entered by accident). We want to continue.
This is pretty much exactly like the first GeneHack you completed. The only difference seems to be that sometimes the DNA fragments are greyed out when you scan over them so you can't tell exactly what sequences are available until you pick them up, which makes it a little bit more difficult, but not much.
Once you complete the GeneHack, you get a message stating that the target (now named Pahana12) has full privileges, although they may experiences some side effects when communication over the phone or internet.
§
> TARGET HAS FULL PRIVILEGES.
>
> ASSIGNED IDENTITY IS PAHANA12.
>
> THIS IDENTITY MUST BE USED FOR ALL COMMUNICATIONS AND
LOGINS.
> THIS IDENTITY CANNOT BE TRACED.
> TO PREVENT NEW TRACES FROM DEVELOPING, THIS IDENTITY
CANNOT BE MODIFIED.
> TARGET MAY NOTICE SLIGHT DISTURBANCES IN: PHONE
CONVERSATIONS, INTERNET-BASED COMMUNICATION, AND OTHER
AREAS WHERE DATA-TRACES ATTEMPT TO RECONCILE. THIS IS A
NORMAL SIDE-EFFECT OF TRACE FAILURE. IT IS NO CAUSE FOR
ALARM.
The screen then starts spitting out all sorts of names and numbers, presumably other members of the network. Pahana then starts to send you a message about trying to help you before the DarkNet is shut down permanently.
§
Good.
They have intercepts in place but have not cracked this network. We are not yet subject to surveillance.
What they cannot understand they will kill. They will destroy this network before we can take over the satellites.
I may be able to help. I will let you know.
You now have access to a new program: GL.BAL FORAGER*
|
|
|
Continue to Page 2 >>
See the Intro page for a list of all the websites, plus brief information about this guide and the game.
|
|