From 286ebefa8a336923ea913b525b08c3eb5b8fee31 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Wed, 14 Jan 2026 09:46:32 +0000 Subject: [PATCH] Compile m03_phone_agent0x99.ink to JSON - fix all EXTERNAL function calls --- .../stages/stage_7/m03_phone_agent0x99.ink | 40 +++++++++---------- .../stages/stage_7/m03_phone_agent0x99.json | 1 + 2 files changed, 21 insertions(+), 20 deletions(-) create mode 100644 planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.json diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.ink b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.ink index bb741ad..44c7535 100644 --- a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.ink +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.ink @@ -15,10 +15,10 @@ VAR rooms_discovered = 0 VAR objectives_mentioned = 0 // External variables -EXTERNAL player_name -EXTERNAL player_approach -EXTERNAL objectives_completed -EXTERNAL stealth_rating +EXTERNAL player_name() +EXTERNAL player_approach() +EXTERNAL objectives_completed() +EXTERNAL stealth_rating() // =========================================== // MAIN PHONE INTERFACE @@ -29,7 +29,7 @@ EXTERNAL stealth_rating [Secure phone connection established] -Agent 0x99: {player_name}, what do you need? +Agent 0x99: {player_name()}, what do you need? -> hub @@ -176,15 +176,15 @@ Agent 0x99: Each flag you capture represents intercepted ENTROPY intelligence. S === hint_general === #speaker:agent_0x99 -{player_approach == "cautious": +{player_approach() == "cautious": Agent 0x99: Your methodical approach is smart. Document everything, connect the dots. } -{player_approach == "aggressive": +{player_approach() == "aggressive": Agent 0x99: Speed is good, but don't miss critical evidence. The hospital connection proof is vital. } -{player_approach == "diplomatic": +{player_approach() == "diplomatic": Agent 0x99: Stay flexible. Read situations. Trust your judgment. } @@ -205,28 +205,28 @@ Agent 0x99: All three together make the case. Agent 0x99: Give me a status update. -{objectives_completed == 0: +{objectives_completed() == 0: Agent 0x99: No objectives complete yet. Have you met with Victoria? Agent 0x99: Priority one: clone her keycard. Everything else depends on server room access. } -{objectives_completed == 1: +{objectives_completed() == 1: Agent 0x99: One objective down. Good start. Keep moving. } -{objectives_completed >= 2 and objectives_completed < 4: - Agent 0x99: {objectives_completed} objectives complete. You're making progress. +{objectives_completed() >= 2 and objectives_completed() < 4: + Agent 0x99: {objectives_completed()} objectives complete. You're making progress. } -{objectives_completed >= 4: - Agent 0x99: Excellent work. {objectives_completed} objectives complete. You're building a solid case. +{objectives_completed() >= 4: + Agent 0x99: Excellent work. {objectives_completed()} objectives complete. You're building a solid case. } -{stealth_rating > 80: +{stealth_rating() > 80: Agent 0x99: And I see you're staying ghost. Perfect operational security. } -{stealth_rating < 50: +{stealth_rating() < 50: Agent 0x99: You're making some noise. Guard is getting suspicious. Tighten up your stealth. } @@ -336,7 +336,7 @@ Agent 0x99: If things go sideways, abort and exfil. We can try again. Agent 0x99: Clean work on that lock. Moving like a pro. -{stealth_rating > 70: +{stealth_rating() > 70: Agent 0x99: And you're staying quiet. Textbook infiltration. } @@ -349,7 +349,7 @@ Agent 0x99: Clean work on that lock. Moving like a pro. [Agent 0x99's avatar appears - serious expression] -Agent 0x99: {player_name}, I just saw the distcc operational logs you submitted. +Agent 0x99: {player_name()}, I just saw the distcc operational logs you submitted. Agent 0x99: This is... this is the smoking gun. @@ -383,7 +383,7 @@ Agent 0x99: Four in critical care when patient monitoring failed. Two during eme Agent 0x99: Keep gathering evidence. Physical documents, LORE fragments, anything that builds the case. -Agent 0x99: And {player_name}? The Architect's directive mentioned Phase 2. +Agent 0x99: And {player_name()}? The Architect's directive mentioned Phase 2. Agent 0x99: 50,000 patient treatment delays. 1.2 million without power in winter. @@ -402,7 +402,7 @@ Agent 0x99: If St. Catherine's was Phase 1... we need to stop Phase 2 before it Agent 0x99: Finish the mission. Document everything. We'll debrief when you're out. -Agent 0x99: And {player_name}? Be careful. Victoria might seem reasonable, but she authorized that hospital attack. +Agent 0x99: And {player_name()}? Be careful. Victoria might seem reasonable, but she authorized that hospital attack. Agent 0x99: Don't forget what she's capable of. diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.json b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.json new file mode 100644 index 0000000..741f301 --- /dev/null +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_phone_agent0x99.json @@ -0,0 +1 @@ +{"inkVersion":21,"root":[[["done",{"#n":"g-0"}],null],"done",{"start":["#","^speaker:agent_0x99","/#","^[Secure phone connection established]","\n","^Agent 0x99: ","ev",{"x()":"player_name"},"out","/ev","^, what do you need?","\n",{"->":"hub"},null],"hub":[["ev","str","^Request hint","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Report progress","/str","/ev",{"*":".^.c-1","flg":4},"ev","str","^Ask about mission details","/str","/ev",{"*":".^.c-2","flg":4},"ev","str","^End call","/str","/ev",{"*":".^.c-3","flg":4},{"c-0":["\n",{"->":"provide_hint"},null],"c-1":["\n",{"->":"report_progress"},null],"c-2":["\n",{"->":"mission_details"},null],"c-3":["\n","#","^exit_conversation","/#","^Agent 0x99: Stay safe. Call if you need backup.","\n","done",null]}],null],"provide_hint":[["#","^speaker:agent_0x99","/#","^Agent 0x99: What do you need help with?","\n","ev","str","^RFID cloning mechanics","/str",{"VAR?":"hint_rfid_cloning_given"},"!","/ev",{"*":".^.c-0","flg":5},"ev","str","^Lockpicking advice","/str",{"VAR?":"hint_lockpicking_given"},"!","/ev",{"*":".^.c-1","flg":5},"ev","str","^Password finding","/str",{"VAR?":"hint_password_given"},"!","/ev",{"*":".^.c-2","flg":5},"ev","str","^Decoding messages","/str",{"VAR?":"hint_encoding_given"},"!","/ev",{"*":".^.c-3","flg":5},"ev","str","^Network reconnaissance","/str",{"VAR?":"hint_network_recon_given"},"!","/ev",{"*":".^.c-4","flg":5},"ev","str","^General guidance","/str","/ev",{"*":".^.c-5","flg":4},"ev","str","^Never mind","/str","/ev",{"*":".^.c-6","flg":4},{"c-0":["\n",{"->":"hint_rfid_cloning"},null],"c-1":["\n",{"->":"hint_lockpicking"},null],"c-2":["\n",{"->":"hint_password"},null],"c-3":["\n",{"->":"hint_encoding"},null],"c-4":["\n",{"->":"hint_network_recon"},null],"c-5":["\n",{"->":"hint_general"},null],"c-6":["\n",{"->":"hub"},null]}],null],"hint_rfid_cloning":[["#","^speaker:agent_0x99","/#","ev",true,"/ev",{"VAR=":"hint_rfid_cloning_given","re":true},"^Agent 0x99: RFID cloning - get within 2 meters of Victoria for about 10 seconds.","\n","^Agent 0x99: The device will vibrate when complete. Keep her talking while it works.","\n","^Agent 0x99: Best moment: when you're both standing near the whiteboard or looking at documents together.","\n","ev","str","^Got it","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^What if she notices?","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n","^Agent 0x99: Natural movement. Don't make it obvious.","\n",{"->":"hub"},null],"c-1":["\n","^Agent 0x99: Play curious recruit. Ask about the training network. She loves talking about her philosophy.","\n",{"->":"hub"},null]}],null],"hint_lockpicking":[["#","^speaker:agent_0x99","/#","ev",true,"/ev",{"VAR=":"hint_lockpicking_given","re":true},"^Agent 0x99: Lockpicking takes time and makes noise. Watch for the guard patrol route.","\n","^Agent 0x99: Wait until the guard is at the far end of the patrol before starting.","\n","^Agent 0x99: If you have lockpicks in inventory, approach any locked door and interact.","\n","ev","str","^Where can I find lockpicks?","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Understood","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n","^Agent 0x99: Check supply closets, maintenance areas, or IT cabinets. Common hiding spots.","\n",{"->":"hub"},null],"c-1":["\n",{"->":"hub"},null]}],null],"hint_password":[["#","^speaker:agent_0x99","/#","ev",true,"/ev",{"VAR=":"hint_password_given","re":true},"^Agent 0x99: People hide password hints everywhere. Sticky notes, desk organizers, whiteboards.","\n","^Agent 0x99: For Victoria's computer, look for personal details. Founding year of WhiteHat Security? Significant dates?","\n","^Agent 0x99: The reception area often has company history. Plaques, awards, founding information.","\n","ev","str","^I'll look around more carefully","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n","^Agent 0x99: Thorough search pays off. Don't rush past obvious clues.","\n",{"->":"hub"},null]}],null],"hint_encoding":[["#","^speaker:agent_0x99","/#","ev",true,"/ev",{"VAR=":"hint_encoding_given","re":true},"^Agent 0x99: CyberChef workstation in the server room handles decoding.","\n","^Agent 0x99: Common encodings: Base64 (looks random but uses A-Z, a-z, 0-9, +, /), ROT13 (looks like scrambled English), Hex (pairs of 0-9, A-F).","\n","^Agent 0x99: If you decode something and it still looks encoded? Multi-layer encoding. Decode again.","\n","ev","str","^What's the difference between encoding and encryption?","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Thanks for the primer","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n","^Agent 0x99: Encoding is just transformation - no secret key needed. Anyone can reverse it if they know the method.","\n","^Agent 0x99: Encryption requires a key. Much more secure, much harder to break.","\n","^Agent 0x99: ENTROPY uses encoding for speed. Encryption is too slow for operational comms.","\n",{"->":"hub"},null],"c-1":["\n",{"->":"hub"},null]}],null],"hint_network_recon":[["#","^speaker:agent_0x99","/#","ev",true,"/ev",{"VAR=":"hint_network_recon_given","re":true},"^Agent 0x99: The VM terminal in the server room connects to Zero Day's training network - 192.168.100.0/24.","\n","^Agent 0x99: Start with nmap for network scanning. Then netcat for banner grabbing. Then service-specific tools.","\n","^Agent 0x99: Each flag you capture represents intercepted ENTROPY intelligence. Submit them at the drop-site terminal.","\n","ev","str","^What's the target priority?","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Got it","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n","^Agent 0x99: Network scan first to map the environment. Then FTP and HTTP for client intel. distcc is the critical one - that's where the operational logs are.","\n",{"->":"hub"},null],"c-1":["\n",{"->":"hub"},null]}],null],"hint_general":["#","^speaker:agent_0x99","/#","ev",{"x()":"player_approach"},"str","^cautious","/str","==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: Your methodical approach is smart. Document everything, connect the dots.","\n",{"->":".^.^.^.11"},null]}],"nop","\n","ev",{"x()":"player_approach"},"str","^aggressive","/str","==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: Speed is good, but don't miss critical evidence. The hospital connection proof is vital.","\n",{"->":".^.^.^.21"},null]}],"nop","\n","ev",{"x()":"player_approach"},"str","^diplomatic","/str","==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: Stay flexible. Read situations. Trust your judgment.","\n",{"->":".^.^.^.31"},null]}],"nop","\n","^Agent 0x99: Remember - Victoria's keycard gets you server room access. Network recon gets you digital evidence. Physical search gets you documents.","\n","^Agent 0x99: All three together make the case.","\n",{"->":"hub"},null],"report_progress":[["#","^speaker:agent_0x99","/#","ev",{"VAR?":"objectives_mentioned"},1,"+",{"VAR=":"objectives_mentioned","re":true},"/ev","^Agent 0x99: Give me a status update.","\n","ev",{"x()":"objectives_completed"},0,"==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: No objectives complete yet. Have you met with Victoria?","\n","^Agent 0x99: Priority one: clone her keycard. Everything else depends on server room access.","\n",{"->":".^.^.^.17"},null]}],"nop","\n","ev",{"x()":"objectives_completed"},1,"==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: One objective down. Good start. Keep moving.","\n",{"->":".^.^.^.25"},null]}],"nop","\n","ev",{"x()":"objectives_completed"},2,">=",{"x()":"objectives_completed"},4,"<","&&","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: ","ev",{"x()":"objectives_completed"},"out","/ev","^ objectives complete. You're making progress.","\n",{"->":".^.^.^.37"},null]}],"nop","\n","ev",{"x()":"objectives_completed"},4,">=","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: Excellent work. ","ev",{"x()":"objectives_completed"},"out","/ev","^ objectives complete. You're building a solid case.","\n",{"->":".^.^.^.45"},null]}],"nop","\n","ev",{"x()":"stealth_rating"},80,">","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: And I see you're staying ghost. Perfect operational security.","\n",{"->":".^.^.^.53"},null]}],"nop","\n","ev",{"x()":"stealth_rating"},50,"<","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: You're making some noise. Guard is getting suspicious. Tighten up your stealth.","\n",{"->":".^.^.^.61"},null]}],"nop","\n","ev","str","^Continue mission","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n","^Agent 0x99: Roger that. Call if you need support.","\n",{"->":"hub"},null]}],null],"mission_details":[["#","^speaker:agent_0x99","/#","^Agent 0x99: Mission objectives recap:","\n","^Agent 0x99: Primary - Clone Victoria's RFID keycard, access server room, gather network intelligence, find physical evidence linking Zero Day to St. Catherine's.","\n","^Agent 0x99: Optional - Collect LORE fragments for deeper intelligence on ENTROPY's structure.","\n","ev","str","^Remind me about Victoria","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^What about The Architect?","/str","/ev",{"*":".^.c-1","flg":4},"ev","str","^Got it","/str","/ev",{"*":".^.c-2","flg":4},{"c-0":["\n","^Agent 0x99: Victoria Sterling, CEO. Codename \"Cipher.\" True believer in free market vulnerability research.","\n","^Agent 0x99: Smart, charismatic, ideologically committed. Don't underestimate her.","\n",{"->":"hub"},null],"c-1":["\n","^Agent 0x99: The Architect is ENTROPY's leadership figure. We don't have identity confirmation yet.","\n","^Agent 0x99: But evidence suggests they're coordinating all the cells. Zero Day, Ransomware Inc, Social Fabric, all of them.","\n","^Agent 0x99: Any intel you find on The Architect is gold.","\n",{"->":"hub"},null],"c-2":["\n",{"->":"hub"},null]}],null],"on_rfid_cloner_pickup":["#","^speaker:agent_0x99","/#","^Agent 0x99: Good, you've got the RFID cloner.","\n","^Agent 0x99: When you meet Victoria, get within 2 meters for 10 seconds. Keep her engaged in conversation.","\n","^Agent 0x99: The device is pocket-sized. She won't notice it unless you're obvious about it.","\n","#","^exit_conversation","/#","done",null],"on_lockpick_pickup":["#","^speaker:agent_0x99","/#","^Agent 0x99: Lockpick acquired. That'll let you bypass physical locks.","\n","^Agent 0x99: Remember - lockpicking makes noise and takes time. Watch for patrols.","\n","#","^exit_conversation","/#","done",null],"on_rfid_clone_success":["#","^speaker:agent_0x99","/#","^Agent 0x99: Excellent. Victoria's keycard cloned successfully.","\n","^Agent 0x99: You now have executive-level access. Server room is yours after hours.","\n","^Agent 0x99: Wait for nighttime, then infiltrate. That's when the real work begins.","\n","#","^exit_conversation","/#","done",null],"on_player_detected":["#","^speaker:agent_0x99","/#","^Agent 0x99: You've been spotted! Talk your way out or prepare for confrontation.","\n","^Agent 0x99: If things go sideways, abort and exfil. We can try again.","\n","#","^exit_conversation","/#","done",null],"on_room_discovered":["#","^speaker:agent_0x99","/#","ev",{"VAR?":"rooms_discovered"},1,"+",{"VAR=":"rooms_discovered","re":true},"/ev","ev",{"VAR?":"rooms_discovered"},1,"==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: New room accessed. Good progress. Search thoroughly.","\n",{"->":".^.^.^.15"},null]}],"nop","\n","ev",{"VAR?":"rooms_discovered"},3,"==","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: You're covering ground. Stay systematic - don't miss critical evidence.","\n",{"->":".^.^.^.23"},null]}],"nop","\n","ev",{"VAR?":"rooms_discovered"},5,">=","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: Impressive exploration. You should have a complete picture of the facility now.","\n",{"->":".^.^.^.31"},null]}],"nop","\n","#","^exit_conversation","/#","done",null],"on_lockpick_success":["#","^speaker:agent_0x99","/#","^Agent 0x99: Clean work on that lock. Moving like a pro.","\n","ev",{"x()":"stealth_rating"},70,">","/ev",[{"->":".^.b","c":true},{"b":["\n","^Agent 0x99: And you're staying quiet. Textbook infiltration.","\n",{"->":".^.^.^.11"},null]}],"nop","\n","#","^exit_conversation","/#","done",null],"m2_revelation_call":[["#","^speaker:agent_0x99","/#","^[Agent 0x99's avatar appears - serious expression]","\n","^Agent 0x99: ","ev",{"x()":"player_name"},"out","/ev","^, I just saw the distcc operational logs you submitted.","\n","^Agent 0x99: This is... this is the smoking gun.","\n","^Agent 0x99: ProFTPD exploit. $12,500. Sold to GHOST. Deployed at St. Catherine's Hospital.","\n","^Agent 0x99: Victoria Sterling personally authorized the sale. \"Cipher\" signature on the approval.","\n","^[Pause]","\n","^Agent 0x99: Six people died in that attack. Six people.","\n","^Agent 0x99: Four in critical care when patient monitoring failed. Two during emergency surgery when systems crashed.","\n","ev","str","^We have them now","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^Victoria knew exactly what would happen","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^This changes everything","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: This is direct causation. Zero Day → GHOST → St. Catherine's. We can prosecute.","\n","^Agent 0x99: Yes. Federal charges. ENTROPY operational conspiracy. This evidence is ironclad.","\n",{"->":"m2_revelation_impact"},{"#f":5}],"c-1":["\n","^You: The healthcare premium. They charged extra BECAUSE hospitals can't defend themselves.","\n","^Agent 0x99: Calculated exploitation of vulnerability. It's not hacking - it's murder for profit.","\n",{"->":"m2_revelation_impact"},{"#f":5}],"c-2":["\n","^You: We're not just disrupting a hacking group. This is mass casualty prosecution.","\n","^Agent 0x99: Yes. The stakes just went up. Way up.","\n",{"->":"m2_revelation_impact"},{"#f":5}]}],null],"m2_revelation_impact":[["#","^speaker:agent_0x99","/#","^Agent 0x99: Keep gathering evidence. Physical documents, LORE fragments, anything that builds the case.","\n","^Agent 0x99: And ","ev",{"x()":"player_name"},"out","/ev","^? The Architect's directive mentioned Phase 2.","\n","^Agent 0x99: 50,000 patient treatment delays. 1.2 million without power in winter.","\n","^Agent 0x99: If St. Catherine's was Phase 1... we need to stop Phase 2 before it begins.","\n","ev","str","^I'll find everything I can","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^We're bringing them all down","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","^Agent 0x99: I know you will. This is what we trained for.","\n",{"->":"m2_revelation_end"},{"#f":5}],"c-1":["\n","^Agent 0x99: Damn right we are. For those six people. And the thousands more at risk.","\n",{"->":"m2_revelation_end"},{"#f":5}]}],null],"m2_revelation_end":["#","^speaker:agent_0x99","/#","^Agent 0x99: Finish the mission. Document everything. We'll debrief when you're out.","\n","^Agent 0x99: And ","ev",{"x()":"player_name"},"out","/ev","^? Be careful. Victoria might seem reasonable, but she authorized that hospital attack.","\n","^Agent 0x99: Don't forget what she's capable of.","\n","#","^exit_conversation","/#","done",null],"on_exploit_catalog_found":["#","^speaker:agent_0x99","/#","^Agent 0x99: The exploit catalog... jesus.","\n","^Agent 0x99: $847,000 in Q3 alone. 23 exploits sold.","\n","^Agent 0x99: This isn't a hacking group. It's an industrial operation.","\n","#","^exit_conversation","/#","done",null],"on_architect_directive_found":["#","^speaker:agent_0x99","/#","^Agent 0x99: You found The Architect's directive. This is massive.","\n","^Agent 0x99: Phase 2 targeting. 427 energy substations. 15 hospitals.","\n","^Agent 0x99: And the cross-cell coordination - Zero Day, Ransomware Inc, Social Fabric, Critical Mass all working together.","\n","^Agent 0x99: This isn't isolated cells anymore. This is a coordinated network.","\n","^Agent 0x99: We need to bring this to SAFETYNET Command immediately.","\n","#","^exit_conversation","/#","done",null],"on_guard_hostile":["#","^speaker:agent_0x99","/#","^Agent 0x99: Guard is hostile! Get to safe distance or prepare to talk your way out.","\n","^Agent 0x99: If combat starts, disable and escape. Avoid lethal force if possible.","\n","#","^exit_conversation","/#","done",null],"on_victoria_computer_accessed":["#","^speaker:agent_0x99","/#","^Agent 0x99: You're in Victoria's computer. Good work.","\n","^Agent 0x99: Look for client lists, transaction records, communications with other ENTROPY cells.","\n","^Agent 0x99: Anything linking her directly to The Architect is priority intelligence.","\n","#","^exit_conversation","/#","done",null],"global decl":["ev",false,{"VAR=":"hint_rfid_cloning_given"},false,{"VAR=":"hint_lockpicking_given"},false,{"VAR=":"hint_password_given"},false,{"VAR=":"hint_encoding_given"},false,{"VAR=":"hint_network_recon_given"},0,{"VAR=":"rooms_discovered"},0,{"VAR=":"objectives_mentioned"},"/ev","end",null]}],"listDefs":{}} \ No newline at end of file