Questions & Answers
Anything that happens, happens. Anything that, in happening, causes something else to happen, causes something else to happen. Anything that, in happening, causes itself to happen again, happens again. It doesn't necessarily do it in chronological order, though. Douglas Adams
Astute scholars will notice that 3Will is a construct of a decimal number, a binary number, a letter and a unit;
the number [3W + i3] is complex, where the product of numeral 3 and the constant W comprise the real component and the binary digits "ll" (decimal value 3) along with unit i comprise the imaginary component
the letter W, pronounced "double U", can be expressed 2U or U+U. Since U is the 21st letter of the alphabet, the sum equates to 42 (a constant with universal meaning)
the product 3W becomes 126, pronounced "1 to 6", which is the set of unique data codes possible on each WAIN channel
the data decodes to a directive, the real component of a complex objective with an entangled imaginary contingent
[(1 to 6) + i3] imputes meaning to "degrees of choice".
This is a proxy conclusion that is not irrevocable. Some unfinished processing may require deep thought and the calculations are estimated to take up to 7.5 million years.
A general strategy might be to balance your resources between attack and defence. However, it's also worth noting that;
satisfying the formative mission objective does not guarantee an immediate conclusion.
a commissioned secret agent can affect data pertaining to the legitimacy of potential Agents-In-Place.
each analyst has an equal probability of success, yet gaining an immunity could bolster their endeavours.
political, diplomatic and operational dealings between covert agents and agencies seem entangled.
a field activated secret agent is a "loose canon".
Directives are interpreted as either commands for standard manoeuvres or authorisations for special manoeuvres:
command directives supply analysts with a relative direction target scope for standard operations.
clearance authorisations point to a particular border portal for covert special operations.
confirmation authorisations provide ratification for the completion of overt special operations.
release authorisations are generated by the detection of withdrawal authority codes within tactical metadata.
The key to effective stacking is to remember the main principles:
only authorised active agents can stack other active agents
the highest source agent stacks over the highest target agent
if the stacking limit is exceeded, the lowest moveable target agent is ejected to the lowest source position
Examples of two possible outcomes are illustrated below.
Experienced analysts should have no trouble dealing with the protocol during most engagement scenarios. However, to supplement basic training, a reference table of the standard hierarchical stacking outcomes is offered below. Be aware that some resultants could be undesirable or of no practical use.
If the captured agent is within the target scope of one of your active field agents, you can attempt an overt special operation to capture the holding agent (see Example 2 above). However, if your source agent is currently holding another agent, you need to carefully examine the possible consequences of the hierarchical stacking protocol outcomes before committing to an extraction (see Example 3 below).
Field activated Secret Agents operate as associate Field Agents. They change their group association during most engagements so the terms captured or teamed and extracted or ejected are blurred.
When field agents reach the primary objective (opposition base) they become Agents-In-Place, remaining inactive, locked in position and secure until the Endgame. This means that they cannot be moved or stacked by either you or your opponent. The only exception is where agents can be moved because they need to be swapped following a successful Endgame Agent Challenge. There are three interesting predicaments that can arise as a consequence of this protocol:
The first instance occurs if you inadvertently drag a captured opposite agent into your own base. This counts towards the total Agents-In-Place for your opponent and the preceding overt entangled state collapses, allowing you to unstack and move away but leaving the opposite agent fixed in place.
The second can occur following a successful agent challenge, where an opposite agent is swapped to the higher stack position over an incumbent Agent-In-Place. This collapses the entanglement in the same way as mentioned above.
The final case occurs if another agent subsequently attempts to stack a disentangled agent that lingers over an Agent-In-Place. A special implementation of the protocol must be adopted. Because the lowest target agent is locked and unmoveable, the middle (moveable) agent must be ejected instead.
No. But if your current target scope includes an active agent, you can attempt a compound overt special operation in the prescribed manner, possibly even applying a TRI with 3FA endorsement. If your attempt is unsuccessful then the usual forfeit ensues.
You can use an auxiliary channel selector to stack your master channel selector;
during special operations that could benefit from a tactical response initiative (TRI)
to initiate a double directive para-special operation.
Not completely free. However, the 3Will mechanism does offer the possibility of "3Choice", for example between;
three target locations, while executing a backwards directive.
three reserve assets, given a withdrawal authority.
three Agents-in-Place, during an endgame agent challenge.
Reserve field agents cannot be cloaked, so whenever you swap an active field agent with your reserve you are potentially changing the Endgame. The cooperative deployment of covert agents has a similar effect. A more tangible benefit can be obtained when the reserve is withdrawn following a release authorisation.
Collaborators can assist analysts by performing functions like;
detecting release authority sequences in tactical metadata
holding an additional withdrawal authority PIN
monitoring group activity and protocol compliance
verifying the integrity, certification and decoding of data
administering order in secure materiel pools
offering strategic or tactical advice
relieving analysts during a protracted Endgame
Yes. You can withdraw any one of your reserve assets (except free agents) as soon as the necessary authority code is detected. There are some benefits for early withdrawal, but there could also be consequences to consider.
Endgame Agent Challenge Protection
Diplomatic Immunity is an acquired state relating to either;
group base infiltration numbers and deeming protocol: field agent teams may be able to offer aggregate resistance
diplomatic quota protocol: Agents-In-Place are only tested once during Endgame
the status of potentially entangled agents: reserve field agents cannot be cloaked.
Intrinsic Immunity is a consequence of covert identity and the secret origin of field activated special agents;
associate field agents are inherently exempt
total field immunity is an additional benefit of conjoint associate agents.
License Grade Levels
1) Trainee 2) Novice 3) Standard 4) Special 5) Advanced
Competency Quota
When a player reaches the highest grade level they are allotted three points. An analyst will lose one point each time a specified error is made until there are none remaining. After that, the entire current opportunity is forfeited if any of the listed errors occur.
Specified Error List:
make an improper or unauthorised move e.g. wrong direction
activate or reactivate an asset into an incorrect location
serious breaches of security protocol e.g. deploy a covert agent without a cooperative transaction or select an illegal channel
cause a significant data transmission error (DTE).
Mission Abort:
Any analyst responsible for the premature termination of a mission must forfeit all their points.
Recovering Points
Each time you complete a mission (regardless of outcome), without any error, you regain one point until you obtain a maximum of three.
The game board, including its components, represents a simulated mission intelligence status terminal. The real thing, imagined below, is a top secret application, running on a secure military grade device, which could actually be issued to CIA analysts.
Theatre of Operations:
The horn torus is a 3D model of the 3Will domain where 3Agents prevail. A prominent feature of the field is the interconnection of event horizons between the poles. Tapping the image below will guide you through an interesting visual journey. For a more detailed explanation of the geometry visit Wikipedia.
Icon Asset
Up Arrow Overt Special Agent
Traverse Covert Special Agent
Locked Secure Selector
Unlocked Insecure Selector
Re-Cycle Free Agent
All are invited to join the 3Will 3Agent 3D discussion. A series of training games, 3Will 3forAll, 3Will 3Way and 3Will 3Up, have emerged as a means of introducing some of the elements and mechanisms of mission simulation to aspiring analysts.
Quotes
The seemingly something is elegantly reorganized nothing.
Peter Atkins
Prediction is very difficult, especially about the future.
Neils Bohr
Everything should be made as simple as possible, but not simpler.
Albert Einstein
Oh, that I was where I would be! Then would I be where I am not! But where I am, I must be. And where I would be I cannot.
"Katie Cruel"
I may not have gone where I intended to go, but I think I have ended up where I needed to be.
Douglas Adams
All the world’s a stage, and all the men and women merely players.
William Shakespeare
Quantum theory says a lot, but does not bring us closer to the secret of the “old one.” I, at any rate, am convinced that He is not playing at dice.
Albert Einstein
Thus the task is, not so much to see what no one has yet seen, but to think what nobody has yet thought, about that which everybody sees.
Erwin Schrödinger
The human mind may devise many plans, but it is the purpose of the Lord that will be established.
Proverbs 19:21 (NRSV)