Files
BreakEscape/planning_notes
Z. Cliffe Schreuders 3b367f75a2 Add Mission 3 'Ghost in the Machine' preparation document
Mission 3: Intelligence Gathering & Network Reconnaissance
- ENTROPY Cell: Zero Day Syndicate
- SecGen Scenario: Information Gathering: Scanning
- New Mechanics: RFID keycard cloning, network reconnaissance
- Difficulty: Intermediate (Mission 3 of Season 1)
- Playtime: 60-75 minutes

Key Features:
- Undercover operation at WhiteHat Security Services (Zero Day front)
- RFID cloning mechanics introduction
- Network scanning integration (nmap, netcat, distcc exploitation)
- Multi-encoding puzzle (ROT13, Hex, Base64)
- Major revelation: Zero Day sold M2 hospital ransomware exploit
- First direct mention of "The Architect" (campaign arc progression)
- Double agent vs. arrest moral choice

Campaign Connections:
- Reveals cross-cell coordination (M2 hospital attack traced to Zero Day)
- Sets up Zero Day as recurring antagonist
- Introduces The Architect as mysterious coordinator
- Client list connects M1 (Social Fabric), M2 (Ransomware Inc), M4 (Critical Mass)

CyBOK Areas:
- Network Security (port scanning, service enumeration, banner grabbing)
- Systems Security (distcc exploitation CVE-2004-2687)
- Applied Cryptography (multiple encoding types, pattern recognition)
- Security Operations (intelligence correlation, systematic investigation)

README includes:
- Executive summary and mission overview
- 9-stage development workflow (same as M1, M2)
- Technical challenges breakdown (RFID, network recon, encoding)
- Narrative arc (3 acts: undercover → infiltration → revelation)
- Key NPCs (Victoria Sterling, James Park, Cipher references)
- LORE opportunities (client lists, exploit catalog, Architect requirements)
- Good practices from M1 & M2
- Critical decisions needed before Stage 0
- Risk assessment
- Development timeline estimate (70-97 hours design)

Status: Ready for Stage 0 initialization
2026-01-14 09:46:31 +00:00
..