Review of Setup
MIST (the board) has icons for the various assets used outside the field (special agents and VPN/DRN channel selectors).
The field is understood to be the surface of a horn torus with an event horizon near each pole.
The directive receiver-decoders have locations to hold the secure pools and master channel selectors.
A vault between the receiver-decoders holds a commissioned secret agent bearing classified information.
Each analyst is assigned one reserve field agent.
An optional collaborator may be assigned to each analyst.
Review of Terms, Conditions and Operations
1) Players (including collaborators) are interpreted as intelligence Analysts who are directed by their respective group agencies. Each player holds a unique group serial number and a PIN.
2) Overt special agents are identified by a hue that conforms to either the light or dark group profile. They also carry a 3FA crypto-key.
3) A banking system has been constituted, utilising four types of reserve accounts: Free, Overt, Covert and Materiel;
Free accounts can be used whenever you have content. The other accounts are considered savings accounts until they are full, when they transition to perpetual trading accounts.
Overt reserves are directly traded to the opposite Free account.
Covert reserves are indirectly traded (cooperatively via the vault) to the opposite Free account.
Materiel reserves (insecure channel selectors) are traded to the opposite reserve Materiel account (see note).
4) Five coloured dice represent five channels of encrypted information.
5) Five coloured counters, matching the dice colours, represent five channel selectors;
One is used as a secure (locked icon) VPN master channel selector (placed on the directive receiver-decoder). The remaining four form a pool of secure channel selectors.
The left and right end positions in the pool are the side channel (DRN) address locations used for restricted standard operations.
The master channel selector may be stacked, using an auxiliary channel selector during special operations that require a tactical response initiative (TRI). The auxiliary channel selector becomes or remains insecure (unlocked icon) after use and is placed in, or traded to, the appropriate reserve account (see note).
Analysts are not permitted to use the same master channel selector colour as their opponent, although an auxiliary selector the same colour is allowed.
Changing master channel selectors and arranging the order of secure pools can be managed at the commencement of each opportunity cycle.
6) Overt or compound special operations usually forfeit the current opportunity if the requisite confirmation authorisation is not received. A crypto-key could be used to avert failure (also see Note below).
7) If an appropriate clearance authorisation is not received, covert special operations can continue with a fall-back standard operation. However, if an auxiliary (public) channel had also been selected, then the special operation fails.
Note: A covert Free-Cycle operation is available to partially recover from special operation failures.
8) Cooperative Transactions:
Special operations involving covert agents are initiated with a handover by deploying one of your active or tradeable covert special agents to replace the secret agent in the vault. Depending on the type of operation, the secret agent is either;
reclassified as covert and placed in reserve (see note)
decommissioned and placed in your group base
reactivated and placed in your active pool
activated as a secret agent in the field.
9) The function of free agents, in the free accounts, depends on the traded agent type;
overt free agents (light or dark group hue) provide one free opportunity where the extra opportunity is only allowed immediately following a successful standard operation.
covert free agents (grey shade) provide one free recovery operation. This allows you to salvage a lost opportunity (due to a failed special operation). You may use the last, or one of the last, received directives to complete a standard operation.
a reserve field agent could be activated as an additional field agent (see sections 12 to 14).
10) Para-Special Operations:
A new class of special operations that work alongside or complement existing operations. The three types are outlined below.
a) The first type is initiated, at the beginning of an opportunity, by stacking your master channel selector with an auxiliary channel selector of the same colour. After receiving a directive, you may choose how to utilise the "double" opportunity. You can either;
move two field locations in the same direction. This may be interpreted as "normal event progression" or a double standard manoeuvre command
treat the double as advanced authorisations (confirmation & clearance) that precede the initiation of an overt special op and an optional covert special op (note the reverse order). This may be interpreted as "special event regression" where the special agent facilitators are deployed after the necessary authorisations have already been received.
b) The endgame agent challenge is now reciprocal, so must be regarded as the second type of para-special operation;
Each analyst is allowed a single opportunity to challenge just one Agent-In-Place during the mission endgame. To effect a challenge, an analyst must deploy a covert agent to cooperatively access the secret agent in the vault. The released secret agent holds the identity of the current covertly entangled field agents (see note). Once a secret agent has revealed their secret, they are decommissioned. If the outcome of a challenge results in a protracted endgame, the decommissioned secret agent is reassigned to the opposite group base to begin a new role as a security guard. The analyst receiving a security guard may choose any empty initial base position. An activated guard is stackable but cannot, themselves, initiate any special operations. The security guard's primary function is to block base locations, so is restricted to only standard operations within the base.
c) Forming a team that includes a covert profile special agent initiates one of three variants of the third type of para-special operation;
i) If a field agent (see note) is teamed with their base security guard (lower), then the guard is promoted to covert status. Traversing an access-controlled border (event horizon in this case) is allowed for the field agent (team leader) during any subsequent opportunity because any manoeuvre directive that scopes an adjoining base portal now includes an elevated clearance authorisation.
ii) If an analyst has teamed an associate (field activated secret agent) with one of their field agents (lower), then the team acquires elevated clearance authorisation and is allowed to traverse any access-controlled border whilst they remain together.
iii) If a team includes an inactive secret agent (lower & demoted), then only the leader can transverse access-controlled borders. This operation appears similar to the first variant because a demoted secret agent is functionally equivalent to a promoted security guard.
11) Restricted Standard Operations:
If you receive a lateral manoeuvre directive during a standard operation you may, optionally, exchange your secure master channel selector with the matching side channel selector in your secure pool then use its addressed SDI directive in a defence restricted operation (see note). Side channel selectors address secure Defence Restricted Network (DRN) alternative channels. The previous master channel selector must be placed in reserve.
12) Reserve Field Agents:
Each analyst is assigned one reserve field agent. The agent is placed in your free account during setup. Apart from their initial status, reserves have the same identifying properties as your active field agents. At the commencement of any opportunity cycle, you may swap the reserve with one of your active field agents (see note).
13) Authority Codes:
Blockchain encrypted data, known as authority codes, are usually decoded into directives. Special embedded code sequences (tactical metadata) directly translate to authorisations without decoding.
14) Reserve Withdrawal:
If, at any stage of an opportunity, you detect an authority code sequence containing your serial number (in any order), a reserve asset of yours directly acquires release authorisation. You can select one to withdraw and reactivate by transferring;
your reserve field agent to any empty location in the field activation row (see note)
a special agent to one of your active pools (see note)
an insecure channel selector to your secure pool.
15) Secret Agent Withdrawal:
a) If, at any stage of an opportunity, you detect an authority code sequence with identical data on all five channels, the incumbent commissioned secret agent directly acquires release authorisation. After a cooperative withdrawal, you can transfer the secret agent to any empty location in your outer line of defence. Field activated secret agents operate as associate field agents except they;
can traverse lateral borders (solo) without requiring covert clearance authorisation
can participate in para-special border operations (see note)
are intrinsically immune to Endgame agent challenges
change their group association if captured or extracted.
If a field activated secret agent enters your base under your control, either alone or as the subordinate of a team, then the associate must mimic (operate exactly as) a security guard. If you form a team using two secret agents in the field, they acquire conjoint status and cannot be separated (unless you move them into your base).
b) A Secret Agent withdrawal may also be initiated if, at any stage of an opportunity, you detect an authority code sequence with identical data on just four channels and your PIN completes the sequence. For example: if your PIN is 5 and you detect an authority code of 5555.
16) Cryptographic Recertification:
Overt special agents carry important operational data in the form of a crypto-key with a particular numeric value. The 3-key can only be admitted by deploying an active overt special agent and is used to retroactively endorse the directive for an overt or compound special operation. The key is applied, using 3-Factor-Authentication, to the encrypted data of the currently selected auxiliary channel to produce a recertified confirmation authorisation. This process will be explained by your advanced level training instructor and the details are available in a classified section of the Operations manual.
Refer to the para-special operations covered in section 10) part c).
Covert agents must be transferred cooperatively. Free agents are excluded from withdrawal.
The usual activation row is your inner line of defence. If no space is available, you can use the middle line of defence.
When you exchange field agents, their status (active or reserve) is also switched.
Only active field agents within your defence region can be deployed and only to empty defence locations. Security protocol must be observed.
The field agent could be an associate. Opposite agents are prevented from capturing an agent-guard team because the stack limit would be exceeded and the security guard cannot be ejected into the field.
Reserve field agents cannot be cloaked.
The appropriate account depends on whether the asset is initially deployed (saved), subsequently deployed (traded) or employed from a free account (traded back).
Insecure channel selectors are traded to, or back to, the opposite materiel reserve account. If the reserve account is full, you may cross trade to the opposite materiel secure pool instead. In this case, the selector regains secure status.
A series of training games have emerged as a means of introducing some of the elements and mechanisms of 3Will 3Agent 3D mission simulation to aspiring analysts.
Rapid Play Game: 3Will 3forAll
Accessible, fast and engaging multiplayer versions.
Parallel Play Game: 3Will 3Way
Intriguing, interplanar team player versions.
Solo Play Game: 3Will 3Up
Novel, competitive, single player versions.
Hypothesis
The mechanics of 3Will encapsulates a complex objective comprising a real directive and an entangled imaginary contingent.
Defining agent properties
Complex Number System
real component ---> colour (shade)
imaginary component ---> ID number
Propositions:
1) If real values of +1 and -1 are assigned to white and black (resp.)
then
white field agents with ID(n) have a complex value of (1 + ni)
black field agents with ID(n) have a complex value of (-1 - ni)
2) If a real value of 0 is assigned to grey (neutral shade)
then
covert special agents with ID(n) have a complex value of (0 + ni)
i.e. imaginary component only
3) A secret agent is able to cloak a pair of field agents by negation
so that
negated white -(1 + ni) is equivalent to black (-1 - ni)
negated black -(-1 - ni) is equivalent to white (1 + ni)
4) If overt special agents have a group hue and a key (3)
then
light hue is assigned a real value of +1/2
dark hue is assigned a real value of -1/2
crypto-key using 3FA is imaginary:
[(auxiliary + key) mod 6]i ---> [endorsed confirmation]i
Defining materiel properties
Complex Data Analysis
real component ---> channel colour
imaginary component ---> channel data
Propositions:
1) If encrypted information is considered imaginary
then communication
channel data have imaginary values.
channel colours have real values.
2) Addressing matching channels necessitates
that
channel selector colours have real values.
3) The absolute value of complex directives.
transform to
relative vector potentials with real angles.
4) Blockchain re-encryption is possible in the complex domain.
Frequency Domain Analysis
Diametrically opposed phasors
Temporal transforms
Abstraction route
To create an empirical model from simulation experiments where competition and interaction contribute to complexity.
Compact Riemann Surfaces
Compact Riemann surfaces can map to surfaces of lower genus, but not to higher genus, except as constant maps. This is because holomorphic and meromorphic maps behave locally like z ↦ zn for integer n, so non-constant maps are ramified covering maps, and for compact Riemann surfaces these are constrained by the Riemann–Hurwitz formula in algebraic topology, which relates the Euler characteristic of a space and a ramified cover. Wikipedia
Horn Torus Topology
The event horizon is defined from the causal structure as the past null cone of future conformal time-like infinity. A black hole event horizon is teleological in nature, meaning that it is determined by future causes. More precisely, one would need to know the entire history of the universe and all the way into the infinite future to determine the presence of an event horizon, which is not possible for quasilocal observers (not even in principle). In other words, there is no experiment and/or measurement that can be performed within a finite-size region of spacetime and within a finite time interval that answers the question of whether or not an event horizon exists. Because of the purely theoretical nature of the event horizon, the traveling object does not necessarily experience strange effects and does, in fact, pass through the calculated boundary in a finite amount of its proper time (from Wikipedia).
Möbius Strips and √3Will
The renormalisation ratio and mapping of non-orientable surfaces.
Virtual Turing Machine
A nondeterministic finite-state machine and inference engine.
This work is now under maintenance:
Current version (26/01/2025) supersedes all previous versions.
Download Resources