Working Group Narnia Meeting - Thu, Oct 24, 2019
△▼△TOP SECRET//SI//DGO△▼△
Report No: GT/GL-191024-072260205
Location: Ithaca, NY; Fort Meade, MD (NSA); Langley, VA (CIA); New York City, NY
Agents:
Summary:
MASTICATE continued analysis of the “Picky Eater” application and its associated custom hardware. A secondary occult symbol was successfully reproduced from the chip via meditative technique, though not identified. NSA confirmed prior review of Picky Eater under Operation DIVING BELL and revealed concurrent interest by a CIA/FBI task force codenamed NARNIA. Subsequent coordination at CIA headquarters established that NARNIA is investigating the “Friday Night Massacre,” linking Picky Eater to two attackers possessing anomalous weapons and identification documents dated to the year 2199–2121 AD. During contact with NARNIA, temporal and/or ontological instability manifested: Agent Justin experienced separation into an alternate historical timeline in which Delta Green operates publicly following a 2036 conflict with maritime entities.
Operation Report:
• At the medical examiner’s office, Agents continued examination of the custom chip associated with Picky Eater.
- The chip displayed a shifting sigil above its silicon surface.
- Philomena identified the primary mark as a scrying symbol from the Book of Thoth.
- A secondary symbol remained visually unfocusable through conventional means.
- Philomena employed an obscure Tibetan meditative practice to enhance perception.
- After extended focus, she reproduced the second symbol from memory: a five-pointed star containing an eye-like form.
- The symbol was not recognized by the Agents.
- Philomena documented the drawing digitally.
• Agent Booth contacted Assistant U.S. Attorney Antonia Pitzerelli regarding prior federal interest in Picky Eater.
- NSA involvement was confirmed.
- Pitzerelli secured a meeting at Fort Meade.
• At NSA (Fort Meade), Agents met Analyst Ann Gibbs.
- Gibbs confirmed Picky Eater had been evaluated under Operation DIVING BELL, a broad deep-web surveillance initiative.
- Picky Eater was assessed as malware requiring custom hardware and therefore low-priority.
- The software rewrites firmware, consumes resources, and degrades hardware over time.
- The application includes a language-processing component that tokenizes user input and feeds processed data into the custom chip.
- Output from the chip is minimally formatted into text and images by the client software.
- Large portions of the code were described as nonsensical yet sophisticated.
- NSA never possessed a functional chip and therefore never executed the full system.
- Investigation was terminated due to limited dissemination and lack of state sponsorship indicators.
- Gibbs disclosed that Working Group NARNIA had recently requested the same briefing.
- NSA logs had been altered, suggesting internal tampering or compartmentalization.
• Pitzerelli confirmed that inquiries regarding NARNIA caused friction but resulted in authorization for MASTICATE to coordinate directly.
• At CIA Headquarters (Langley), Agents met Winston Shepard.
- Shepard confirmed NARNIA is a joint CIA–FBI task force focused on counterterrorism.
- MASTICATE was authorized to liaise and share intelligence.
• Agents traveled to New York City and met Special Agent Fallon Taylor of Working Group NARNIA at a front office (Kerber, Wilson & Associates).
• Taylor briefed MASTICATE on the “Friday Night Massacre” in Oleander, Pennsylvania.
- Two Muslim gunmen killed 23 and wounded 12 at a high school football game.
- The attackers were killed by police.
- No biometric or official identity records exist for the perpetrators.
- Weapons were of unknown manufacture, derived from Kalashnikov design but chambered for nonstandard 5.4x40mm ammunition.
- Ammunition source is unidentified.
- Their phones contained Picky Eater.
- Chat logs showed the attackers advocating continued jihad; respondents claimed such conflict was obsolete because “the Crusaders are gone and dead.”
- Identification cards recovered from the attackers indicated citizenship in the “Global Caliphate of the Peace of God,” valid 2199–2121 AD.
• During this briefing, all present MASTICATE Agents simultaneously realized Agent Justin was not physically present, despite prior assumption that he had accompanied them.
• Concurrently, Agent Justin experienced disorientation upon entering the elevator at NARNIA’s New York location.
- Upon exit, he found himself alone in a red-carpeted hallway labeled “National Clandestine Services Museum – New York Collection.”
- Digital devices indicated the year was 2054.
- Online research revealed Delta Green operating publicly following a 2036 war against maritime entities (“Deep Ones”).
- Public documentation described genetic infiltration of coastal populations and ongoing screening programs.
- Justin identified a museum exhibit dedicated to “Fallon Montgomery Taylor,” deceased 2038, veteran of Working Group NARNIA.
- The temporal divergence suggests alternate historical progression.
• Meanwhile, in baseline reality, Taylor continued briefing MASTICATE regarding anomalous technological and ideological indicators surrounding the Pennsylvania attackers.
Analysis and Recommendations:
-
Picky Eater Assessment:
- NSA evaluation underestimated strategic implications due to hardware restriction.
- Language transformation component combined with externalized processing suggests nonlocal computation or extradimensional interface.
- Custom chip remains central anomaly vector.
-
Working Group NARNIA:
- Operatives possess higher compartmental access to Program-level intelligence.
- Their investigation intersects Picky Eater, anomalous weapon systems, and temporal displacement indicators.
- ID documents dated 2199–2121 AD correspond to Justin’s observed 2054 timeline, implying a progressive geopolitical restructuring culminating in a “Global Caliphate.”
-
Temporal Instability Event:
- Justin’s separation event coincided with contact between MASTICATE and NARNIA.
- Museum evidence indicates future normalization of Delta Green’s mission following overt war with maritime entities.
- Public Delta Green existence contradicts current Program secrecy doctrine.
- The death of Fallon Taylor in 2038 implies NARNIA’s operational lifespan is finite in that timeline.
-
Deep One Conflict Narrative:
- Public historical account of war with maritime entities parallels Innsmouth-era precedents.
- The genetic infiltration narrative mirrors legacy intelligence regarding hybridization phenomena.
- If authentic, indicates catastrophic containment failure in mid-21st century.
-
Operational Risk:
- Agents are experiencing synchronized perceptual anomalies.
- Cross-temporal bleedthrough possible via Picky Eater hardware or NARNIA contact node.
- Elevated SAN erosion risk across team.
Recommendations:
- Immediate containment protocol for Picky Eater chip; restrict further activation attempts.
- Covert background investigation into Working Group NARNIA membership and clearance pathways.
- Monitor Agent Justin for reintegration anomalies upon return.
- Quietly audit NSA DIVING BELL records for unauthorized edits.
- Prepare contingency planning for public-exposure scenario analogous to 2036 “Deep War” timeline.
- Cross-reference ID dates and “Global Caliphate” terminology with existing counterterrorism predictive modeling.
Potential convergence between Picky Eater dissemination, temporal displacement phenomena, and large-scale geopolitical transformation warrants A-Cell review at highest priority.
Back at the microscope, the group discusses the symbol that won’t focus and attempts to identify or capture it: McCarter asks Philomena whether she recognizes the unclear symbol; she does not. The team reiterates that photographs and direct focus attempts do not work: Philomena proposes using occult knowledge and technique rather than mechanical capture: Philomena performs a meditative practice to heighten environmental/detail absorption and mental recall: The Handler describes it as an obscure Tibetan monastic practice intended to improve one’s ability to absorb details and later recall them with precision. Philomena confirms she has tried it before and believed it helped with recall, but it is difficult and time-consuming. She makes a POW check to execute the technique and succeeds (she notes her POW is very high “by design”). The meditation takes an extended period (approximately 30–45 minutes): The meditation yields a recoverable image of the previously unreadable symbol, which Philomena reproduces: Philomena cannot “see” the symbol cleanly in the normal sense during the process, but when finished she has a clear mental image and sketches it on paper. The Handler describes what she reproduces: Philomena suffers a SAN cost for forcing the result: The Handler clarifies: Philomena takes a photo of her drawing to preserve an exact copy. Philomena considers information-sharing, but chooses secrecy: The group reviews remaining leads and decides on next steps: The Handler notes the time has advanced into late afternoon after a full day of running leads. The team confirms certain earlier work has already been done: The Handler identifies unresolved investigative paths: The team discusses Wallace’s apparent profile: The team also revisits McKay’s parents: Pitzarelli calls Frank with a proposed escalation: direct NSA contact Pitzarelli asks what the team learned from the FBI Cybercrimes contact: Pitzarelli says she has contacts at NSA and can likely get the team in front of an analyst with the clearance to discuss what they know. Frank expresses suspicion that the obstruction might not be “NSA” as an institution but someone connected to Pitzarelli’s world; she acknowledges that suspicion off the record. Pitzarelli admits she tried to see whether “their group” was already working on it, but was told she should not dig—interpreting that as “yes, but they don’t think we need to know.” She frames a strategy: step on enough toes that it becomes easier to brief the team than to keep dodging them. The plan becomes a trip to Fort Meade, Maryland (NSA HQ area), with a meeting scheduled mid-morning the next day. Pitzarelli separately calls McCarter and pushes him toward deeper “abilities” The team travels to Fort Meade and meets NSA analyst Ann Gibbs The group goes through multiple security checkpoints; NSA takes electronics and processes them through heavy security protocols. In a secure internal meeting room, the analyst introduces herself as Ann Gibbs: Gibbs confirms the request and states the agency has been tracking Picky Eater under an umbrella effort called Operation Diving Bell: Gibbs summarizes NSA’s historical Picky Eater assessment: NSA reviewed the software a couple of years ago, but the exact date is missing due to a suspected erroneous edit in logs; she says she needs to track down what happened. Picky Eater masquerades as a search aggregator grouping sites by topic, and includes VPN/“security” type framing. She characterizes it as “malware through and through,” creating substantial harm on host machines: NSA rated it low priority because it requires custom hardware (a chip) to run: The team asks about the chip and provenance: Gibbs asks whether the team is affiliated with “Working Group Narnia”: Gibbs provides technical detail on how Picky Eater processes input/output (as she understands it without the chip) Gibbs explains she has not seen a mobile version and asks questions about Android/iOS variants; the team answers generally without disclosing their most sensitive assets. The team deliberately avoids revealing that they possess a working chip and have run the system; Frank explicitly does not want NSA to take the chip. Gibbs describes a confusing internal component she calls a “language transformer”: Gibbs confirms output includes images (and text): Gibbs’s interpretation of purpose: Frank presses Gibbs on recency of chatter; she implies something is happening now The team exits NSA and conducts basic counter-surveillance checks Frank reports back to Pitzarelli and requests information on Working Group Narnia Frank calls Pitzarelli immediately after leaving NSA. He reports: Pitzarelli says she can request information on the keyword “Working Group Narnia,” but expects it will raise eyebrows. She instructs the team to pause and get lunch while she makes calls. Pitzarelli escalates the team into direct contact with the CIA-linked Narnia effort Around early afternoon (about 1 p.m.), Pitzarelli calls back: At Langley, the team has a brief meeting with a senior CIA official, Winston Shepard: The team travels from the D.C. area to New York City for the Narnia meeting The meeting at Kerber, Wilson and Associates begins—but the team’s composition fractures As the team heads up, the narrative splits: Justin experiences a sudden, intense disorientation upon entering an elevator: Justin investigates his surroundings: He observes pamphlets labeled “National Clandestine Services Museum, New York Collection.” He searches online (Wikipedia/Maps) and finds that his world context has shifted: Justin begins exploring the museum hallway: In the primary timeline, Frank, Philomena, and McCarter enter the law firm office and meet a Narnia representative The three agents reach the Kerber, Wilson and Associates entry and buzz the intercom. They are visually checked via camera and admitted. They are greeted by a man in dark slacks and a rolled-sleeve white shirt who introduces himself as Special Agent Fallon Taylor. Taylor confirms they are “Working Group MASTICATE” and notes he believed there were supposed to be four of them: Taylor explains Narnia’s scope and why Picky Eater matters to them: It is not “just” Picky Eater; the software is tied to a prior mass shooting event that occurred roughly a week before McKay’s shooting. The news called it the “Friday Night Massacre”: Taylor presents evidence indicating the shooters did not come from any normal identity pipeline: Narnia could not find their names or biometric information in any government database, which is “odd but explainable” until combined with other anomalies. He produces two identity cards written in Arabic; Frank and McCarter can read Arabic. The cards appear to be citizenship IDs for “the Global Caliphate of the Peace of God.” The IDs list validity dates that do not make sense in the current era: The group makes SAN checks in response to the implications; McCarter fails and loses 1 SAN (the others react to the future-dated anomaly as highly disturbing even if “misprint” is briefly raised as a possibility). Taylor details additional anomalies about the Oleander shooters and how Picky Eater connects Weapons and ammunition: Electronics: The shooters had phones made by no known manufacturer. Narnia recovered cached phone data showing the shooters engaged in extensive online discussion and ideological debate: Software linkage: Taylor attempts to access further material but hits a technical block Taylor expresses frustration with a VPN client he can’t connect to and admits he doesn’t even know what “VPN” stands for. He prompts the team to make End Times checks (the three present agents roll and succeed). Immediately after, the Handler calls for SAN checks: The session ends on a dual cliffhangerSession Notes
△▼△TOP SECRET//SI//DGO△▼△