User Tools

The Shaping Spreads (02/2013)

02/01/2013

COVCOM
A code word signifying a Covert Communication.



02/02/2013

NONCONSCIOUS
Mental functions that are not available to consciousness or memory

Hidden Info
Found in the source is the following
411350901
000411511
000611501
511050901
711550211
101811501
511011101
790811250

Reverse this string, dividing it into groups of 3 removing all groups that end up being 000 and then convert from decimal to ASCII.

4va
ens
ive
p7u
m2s
it
sr
m5r

Split into 2 groups of 4, interleave them: 4vam2sensitivesrp7um5r

Remove the spurious ‘m’ instances: 4va2sensitivesrp7u5r

This next part is a stretch. The P7 is a 9mm handgun. Replace it with 9.

4va2sensitivesr9u5r



02/03/2013

PROFILE
The sum of all aspects of an operative or target's overt physical and behavioral persona.

Hidden Info
The text bxt4t4t4bxt4b4bxbxb4bxbxb4txb4t4bxbxt4t4txbxt4txb4t4bxt4b4bxbxtxb4bxtxbxtxtxbxt4b4bxtxb4txtxb4txt4b4t4bxt4b4bxtxb4t4t4txt4txb4t4bxtxb4bxtxt4t4bxt4t4bxt4bxbxbxb4 is hidden.
Encrypting with a railfence of 2 we get btttbtbbbbbbbtbtbbtttbttbtbtbbbtbbtbttbtbbtbttbttbtbtbbtbtttttbtbtbbtttbttbtbbbbx444x44xx4xx4x44xx44xx4x44x44xxx4xxxxxx44xx4xx4x444x44xx444x4x44xx4xx44x44x4xxx4
Substitute the letters for binary values like this
b ⇒ 0, t ⇒ 1, x ⇒ 0, 4 ⇒ 1
And divide in groups of 5 Dividing the result from bt and x4 and converting to ASCII we obtain
npbsvtimevtwzsvp and nyesevdarkvnvivq
Then just replace n ⇒ 9, sv ⇒ 7, tw ⇒ 2, iv ⇒ 4 to get the two passcodes - 9ye7darkv9v4q and 9pb7timev2z7p



02/04/2013

OWVL
One Way Voice Link. A shortwave radio link used to transmit a prerecorded and enciphered message to an operative in a hostile area..

Hidden info
Found in the source code - z5.w=uved4au9

Reverse to 9ua4devu=w.5z

First number is 9. Replace = with 9 (same as first number)
Second number is .5. Replace .5 with 2 (0.5 x 4 - the second number is 2)
We get another passcode - 9ua4blackdevu9w2z



02/05/2013

PSYCHOMETRICS
The area of psychology focused on mental testing.

Hidden Info
The string 16UM7DLVLFIDF10F19R is hidden

Converting the numbers to letters → PUMGDLVLFIDFJFSR
Applying a affine of 3 and 3 → EXDBAUGUSTASCSFW
letters to numbers in relevant slots we get a new passcode - 5xd2augustas3s6w



02/06/2013

NO COMEBACKS
Carrying out an assassination in such a manner that it can not be traced back to the agency ordering the hit. A clean hit.



02/07/2013

PLASMA
From the intelligence world. A secret technique or mechanism for defeating a lock.



02/08/2013

RESIDUAL
Traces that an operation has taken place. No residual means that there is no trace of the operation.



02/09/2013

ASSEMBLAGE
Artifacts discovered together and presumed to have been used at the same time or for similar tasks.



02/10/2013

THE EYE
A surveillance team operative who has the target under visual observation at any given moment in time.



02/11/2013

IN SITU
Latin for In Position. In archaeology, to signify the study of an object unmoved from its original position.



02/12/2013

PHOTINT
Photographic Intelligence, renamed IMINT (Image Intelligence). Usually involves high-altitude reconnaissance image gathering using spy satellites, aircraft or UAVs.



02/13/2013

FREE ASSOCIATION
A mental exercise in which a person gives a running account of their thoughts, wishes, physical sensations, and any mental images as they are occurring.



02/14/2013

SUN TZU
A famous Chinese general. He authored the book The Art of War in about 400 B.C.E



02/15/2013

PRESQUE VU
The moment just prior to experiencing an epiphany

Hidden Info
In the source you can find
<span style=”color:#aca69a; line-height:3px; font-size:3px; letter-spacing:-2px;”>
1331233333231313
6616840444856366
3100997936950794

Read by column
163 361 310 ……
Add 2 to each number
165 363 312 …..
Divide by 3
55 121 104 ….
Convert from decimal to ascii to get: 7yh6augustaw6q9z
Replace “augusta” with her last name and you get a new passcode 7yh6byronw6q9z



02/16/2013

RATIONALIZATION
A mental defense mechanism, described by Freud, by which logic is used to explain away irrational behavior.



02/17/2013

MISDIRECTION
A staple tactic for conjurers and magicians. In counterintelligence, it refers to the providing of a plausible explanation for an event caused by something else.



02/18/2013

IN EXTREMIS
An exceptionally urgent situation requiring that immediate action be taken to minimize loss of life.



02/19/2013

THE SOLVE
The solution to a specific puzzle or problem. Any solve properly understood will lead to more questions.



02/20/2013

HARBINGER
A forerunner who hints at the coming of a future event.



02/21/2013

BARYOGENESIS
Refers to the as yet unresolved process in physics that results in our universe appearing to contain much more matter than anti-matter.



02/22/2013

IN THE WIND
When a target of surveillance has escaped and cannot be tracked further.



02/23/2013

EXFILTRATION
A clandestine operation designed to get an operative out of danger.



02/24/2013

QUASIPARTICLES
An effect by which particles traveling through solids can behave as though they were particles with completely different properties traveling through free space.

Hidden Info
In the source 824046glitchy19094373 (UNSOLVED)



02/25/2013

BEDLAM
Confusion, chaos and uproar.

The word derives from Bethlem Royal Hospital, a treatment facility for the insane founded in the 13th century

Hidden Info
In the source you can find
<span style=“letter-spacing:4px; font-size:2px; color:#aaa494”>7d6db9ab3a6187ca6ea76b65



02/26/2013

MAGNETIC MONOPOLE
A theorized particle with properties like a magnet with only one of a “north” or “south” end.

Was thought to have been detected on Valentine's Day, 1982 at Stanford University, but no experiment has ever been able to reproduce this detection.



02/27/2013

WINDOW DRESSING
Ancillary details included in an intelligence operation to convince observers that what they are seeing is real.



02/28/2013

PRONOIA
The opposite of Paranoia. A suspicion that a conspiracy exists to aid and benefit you.