□ CIA
Cloud Intelligence Agency
Agencies are the cybersecurity and counterintelligence arms of independent State political organisations (Groups) that steer missions by issuing classified Directives to Analysts through MIST.
□ Analysts
CIA Executive Intelligence Operatives
Analysts execute assigned missions by managing assets, complying with Directives, observing protocol and contending with diplomatic challenges.
□ MIST
Mission Intelligence Status Terminal
A virtual state machine and resource management system comprising:
1) Interactive zones
a) central panel
normalised field map; defence regions; group bases.
active special agent pools.
b) side panels
reserve asset pools (bank).
communications; secure materiel pools; vault.
2) Operational facilities
location tracking.
directive receiving & decoding.
asset deployment & state monitoring.
asset stacking.
border portals.
bank transactions.
secret storage.
3) Encrypted digital data packets
a cache of WAIN and DRN channels streamed in cycles.
□ Assets
Resources available to each Analyst:
1) Assigned Agents (light or dark Group)
eight active Field Agents.
one reserve Field Agent.
four Overt Special Agents.
one optional collaborator.
2) Joint Agents (independent)
eight Covert Special Agents.
one commissioned Secret Agent.
field Secret Agents - when activated, operate as associate Field Agents (refer to Operations section) .
3) Free Agents
up to four traded reserve Special Agents.
4) Agents-In-Place
up to four Field Agents (or associates) that have infiltrated mission objective target locations.
5) Cloaked Agent
one of your Field Agents (potentially). Reserve Field Agents cannot be cloaked.
6) Security Agent
one decommissioned Secret Agent reassigned as base security guard during Endgame.
a demoted field Secret Agent mimicking a base security guard to comply with stealth protocol.
7) Materiel
five receiver-decoder Channel selectors.
□ Identification
Evidence of alignment or association:
1) Analysts hold a unique five digit serial number and a PIN
light Group - s/n includes each numeral 1 to 5
dark Group - s/n includes each numeral 2 to 6
each player - single digit PIN between 1 and 6
Serial and PIN assignment: During mission activation, an election is carried out to align Analysts with Groups and collaborators with Analysts. A pair of contenders throws one die each. The first to throw a 1 or 6 exclusively becomes aligned with the light or dark Group respectively. Players may choose an ID card containing their unique Group serial number and authorisation PIN.
2) Field Agents have a Group profile shade and an ID number
light - ID number 1 to 9
dark - ID number 1 to 9
3) Covert Special Agents have a Joint profile shade and a covert (hidden) or a secret (entangled) ID number
grey - ID number 1 to 9
The roles of Joint Agents are distinguishable only by the titles ascribed to them for each specific context.
4) Overt Special Agents have a Group profile colour and a key
light Group - light hue
dark Group - dark hue
cryptographic key - numeral 3
□ 3Will
A phenomenon described by three interpretations:
1) Philosophical
The juxtaposition of self-determination and predetermination.
2) Metaphysical
The entanglement of "free will" and "degrees of freedom".
3) Political
The State machination (intrigue) claiming Group alliance to an inexorably independent third party.
□ Entanglement
An abstract connection between entities
Types involving superposition of states:
1) Overt entanglement
stacked agents (hierarchical state).
stacked channel selectors (topological state).
2) Covert entanglement
cloaked agents (potential state).
3) Dimensional entanglement
toroidal field geometry (spatial state).
event regression (temporal state).
□ Indeterminacy
The non random quality of indefiniteness
A condition inherent in the nature of 3Will and exhibited by the zero-sum relationship between opportunity and risk. Accordingly, every potential benefit has a commensurate, albeit equivocal, cost.
□ Objective
The primary goal
Infiltrate the opposite group's field base using your Agents.
□ Conclusion
Group base seizure
A successful outcome is ultimately deemed to occur when three Agents-In-Place survive Endgame.
□ Stratagems
Tactical or strategic initiatives:
1) Intrinsic defence (obligatory)
protect your base.
impede opposite agents.
2) Restricted defence (optional)
Strategic defence initiatives (SDI);
directive override.
3) Expedient offense (discretionary)
Tactical response initiatives (TRI);
capture opposite agents.
extract your agents.
team your agents.
attain diplomatic immunity.
traverse borders.
□ Mission Abort
Premature termination
If the ID number of either a Covert Special Agent or a commissioned Secret Agent is revealed by a Group, without the necessary elevated Endgame authorisation, the mission must be aborted. The opposite Group can claim a political victory.
□ General
Standard codes of conduct:
1) Command directives are mandatory.
2) Assets must be active, secure or tradable to initiate operations.
3) Opportunities are forfeited when an operation fails.
4) Opportunity cycles end after a successful operation.
5) Field Agents can be deployed only to adjoining and unoccupied target locations.
6) Field Agents become Agents-In-Place (inactive and locked) after infiltrating mission objective locations.
7) Security Agents are not allowed in the field so can only be deployed to unoccupied base locations.
8) Borders cannot be traversed.
Note: These codes are operating principles. For rules of engagement refer to the Operations section.
□ Security
1) Communications
a) Unique Primary WAIN Address
Analysts must never arm their receiver-decoder with the same Master Channel Selector as their opponent.
b) Privacy
Only secure Materiel assets can be used as WAIN Master Channel selectors.
Auxiliary Channel selectors are not necessarily secure or unique and the channel's data may be cryptographically recertified using 3-Factor-Authentication (3FA).
The use of public auxiliary communications channels during Covert operations could compromise your stealth profile.
c) Blockchain Data Integrity
If a significant VPN data transmission error (DTE) occurs then the data must be resent.
2) Stealth
The identity of all Covert Special Agents must remain hidden except to comply with Endgame protocol.
Risking Covert Agents requires a cooperative transaction involving a handover with the incumbent Secret Agent (refer to the relevant Special Operations sections).
Covert Operations, in the event of failure, are allowed a disengagement Fall-Back operation, except if auxiliary channels have also been selected.
If a field activated Secret Agent enters your base under your control, either alone or as the subordinate of a team, then the associate must mimic (operate exactly as) a Security Guard.
3) Defence
Defence regions are demarcated as the half of the Field containing your Group base.
There are three lines of defence; inner (nearest the base), middle and outer.
Analysts are provisionally authorised to override lateral manoeuvre Directives using Strategic Defence Initiatives delivered via the Defence Restricted Network (DRN). An SDI can only be initiated from inside your defence region and must be contained within its boundaries.
If you form a team using two Secret Agents in the field, they acquire conjoint status and cannot be separated (unless you move them into your base).
□ Stacking
1) Convention
Stacking is the abstract three dimensional mechanism employed to visualise certain functional relationships represented in the MIST simulation.
2) Stack Limit
Where stacking is authorised, it is restricted to a maximum resultant connection of two assets.
3) Stack Hierarchy Algorithm
a) Field Agents
Only active source Agents can stack with active target Agents. The target Agent (lower) assumes an inactive state and is controlled by the source Agent (higher). If the stack limit is exceeded, the lowest moveable agent is ejected and placed lowest in the source location (injected).
b) Materiel Assets
Where allowed, Channel selectors can stack with the Master Channel selector. At the end of the opportunity, the Auxiliary selector is reserved with insecure status whilst the Master Channel selector remains secure (refer to the relevant Special Operations sections).
□ Endgame
1) Protracted Completion
Whenever the formative Mission Objective conditions are met, Endgame protocol ensues until Conclusion is obtained.
2) Diplomatic Quota
Base seizure declarations are contestable. However, an Analyst is only allowed to invoke the Endgame Agent Challenge once.
3) Legitimacy Deeming
Only one Agent-In-Place may be integrity tested in a challenge. The status of those remaining is deemed legitimate. Reserve field agents are not examined because they cannot be cloaked.
4) Diplomatic Immunity
The state attained resulting in an incontestable base seizure declaration. Endgame protocol is rendered unnecessary because Conclusion is inevitable.
□ Opportunity Cycles
Command and control information is conveyed periodically. Changes of state (events) occur in a prescribed (usual) order according to each individual or compound operation.
A typical opportunity (turn of events) includes:
1) Reconnaissance
data collection telemetry.
evaluation of surveillance intelligence.
2) Asset management
a) Materiel
configuration of master channel & secure pool.
b) Agents
exchange of reserve and active field agents.
3) Operations classification, prioritisation & logistics
a) mandatory
normal - standard ops (post-directive).
b) optional
restricted - alt. standard ops (SDI-directive).
proactive - covert special ops (pre-directive).
retroactive - overt special ops (post-directive).
meta-active - para-special ops (ulterior-directive).
4) Reception and decryption
information acquisition
authority code detection
cryptographic recertification
intelligence data decoding
5) Directive analysis, classification & authorisation
standard - routine or SDI.
proactive - clearance.
retroactive - confirmation.
meta-active - elevated.
6) Execution
control telemetry.
single, compound or free-cycle operations.
7) Termination
□ Channels
Authority codes move throughout a Group along various paths or channels. Structured AI, in the form of command and support networks, establishes VPN and DRN channels that control the dissemination of information by ensuring the correct data passes securely to authorised agents.
□ Receiver-Decoder
Key messaging components of MIST:
1) WAIN (Wide AI Network)
A channel cache, representing a virtual private network (VPN) node, provides the conduit for secure communications between Cloud Agencies, Analysts and Agents.
2) DRN (Defence Restricted Network)
Alternative channels for strategic defence initiatives (SDI).
3) Channel Selection
Channels are distinctly coloured dice. Each die carries a set of encrypted digital data. Selectors are the coloured Materiel assets used to address matching Channels. A secure Master Channel selection is essential for all operations. Auxiliary (public) Channel selection is allowed, in accordance with Materiel stacking protocol, during special operations that require a tactical response initiative (TRI). Alternative DRN Channel selection is used in Restricted Standard operations.
5) Reception
Receiving entails reading a particular instance of data from a selected Channel currently held in the cache. Communications security protocol must be observed.
6) Cryptographic Recertification
A crypto-key may be applied, using 3FA, to endorse the data of an Auxiliary Channel during Overt Special Operations.
7) Decryption
The compass scope annotations are used to decode the received digital data into Directives. Special authority code sequences (tactical metadata), embedded within the network blockchain, directly translate to release authorisations without requiring decoding.
8) Telemetry
Status updates are rendered by the automatic background transmission, reception and collection of operational support data. Remote access to the network is protected by firewall systems situated in a secure compartment between the communications hubs.
□ Directives
Classified operational controls:
1) Deployment: Manoeuvre Command
relative scope - normal or restricted standard operations.
2) Engagement: Authorisation
confirmation - overt special operations.
clearance - covert special operations.
elevated - para-special operations.
3) Employment: Authority
free-cycle - free agent operations.
release - withdrawal authority.
□ Accounts
Reserve pools of risked assets:
1) Overt account
holds Overt Special Agents ("up arrow" icon).
2) Covert account
holds Covert Special Agents ("traverse" icon).
3) Free account
holds Free Agents and reserve Field Agents ("recycle" icon).
4) Materiel account
holds insecure Channel Selectors ("unlocked" icon).
□ Transactions
1) Saving
When active special Agents or secure Channel Selectors are risked they are deposited into corresponding reserve accounts.
2) Trading
When a reserve savings account becomes full it transitions to a perpetual trading account. In this mode assets can be reused by following the specified trading procedures.
a) Direct Trading
Overt agents are traded to the opposite Free account.
Materiel is traded to the opposite insecure account.
b) Indirect Trading
Covert agents are indirectly traded to the opposite Free account. In accordance with Stealth protocol, all transactions involving Covert (joint) assets must be cooperative.
c) Cross Trading
Materiel assets may be traded directly to the opposite group's secure pool if the regular target insecure account is full. In this case, the asset regains secure status.
d) Free Trading
traded Agent assets in the Free accounts are traded back to their originating group accounts (indirectly if Covert).
free-cycle operations may be initiated whenever you have any Free content and the target reserve account is not full.
a reserve Field Agent may be exchanged with one of your active Field Agents.
3) Withdrawal
If a release authority is received, a specified asset may be withdrawn and reactivated by transferring to a designated activation location (refer to Operations section).
□ Analysts
Analysts are aligned with a particular Group (light or dark) by using a serial number election (see Fundamentals). After all setup activations have been completed, the light Group Analyst commences the first opportunity cycle.
□ Collaborators
An optional collaborator may also be assigned to each Analyst by serial number election.
□ Field Agents
Deploy your assignment of eight active Field Agents to their initial positions (inner line of defence locations, adjacent to your group base). Deploy the reserve Field Agent to your Free account in the bank (annotated with "Recycle" icons).
□ Overt Special Agents
Deploy your assignment of four Overt Special Agents to the active pool area located behind your group base (annotated with "Up Arrow" icons).
□ Covert Special Agents
Security Caution: Ensure ID numbers for all joint agents are hidden and remain secret.
Shuffle the nine Covert Special Agents. Select a contingent of four and deploy them to the active pool area located behind your group base (annotated with "Traverse" icons).
□ Secret Agent
The final Covert Special Agent is transferred to a safe location, represented by a Vault in the middle of the communications panel. This initiates a covert entanglement between the commissioned Secret Agent and a pair of potentially cloaked Field Agents.
□ Master Channel
Choose one of your five allocated secure Channel Selectors as a primary VPN address, attaching it to the centre of your receiver-decoder in the communications panel. The dark Group Analyst has first preference.
Security protocol reminder: Analysts must always maintain a unique Master Channel selection.
□ Secure Channel Selectors
The remaining four allocated Channel Selectors are stored in the secure pool area located below your Directive receiver-decoder (annotated with "Locked" icons).
□ WAIN Cache
Prepare the Wide AI Network infrastructure by loading the digitally encrypted information packets (five coloured dice) into the VPN channel cache (data collection system).
□ Deployment
Mandatory command scope
□ Normal
Standard field manoeuvres
□ Defence Restricted
Alternative field manoeuvres
□ Engagement
Confirmation authorisation
Cryptographic recertification
□ Capturing
□ Teaming
□ Extraction
□ Engagement
Clearance authorisation
□ Lateral Border Portals
Secret Agent cooperation
Border traversing
□ Fall-Back Standard Operation
Stealth disengagement - impunity
□ Compound Special Operation
Active strategic target in scope
□ Engagement
Elevated authorisation
□ Double Directive
Repeat command - normal event progression
Dual authorisation - special event regression
□ Endgame Agent Challenge
Covert Agent participation
Spectral integrity - uncloaking
Decommissioning
□ Access-Controlled Borders
Security Guard participation
Base border traversing - event horizon
Associate Field Agent participation
Restricted border traversing
Unrestricted border traversing
□ Employment
Conditional authority
□ Extra Opportunity
□ Recovery Operation
□ Withdrawal Authority
Reserve release authorisation
Secret Agent release authorisation