Wednesday, 11 March 2015

Day 145, day of reckoning



A brief outline of the case is as follows.

We have a photograph of the mysterious object.

Run an image check against the acquired photograph of the object.  Ascertain whether the object poses a threat to local or national security.  Identify interested parties, known activists, militants, object hoarders.  Bring members of the known interested parties, groups, etc in for questioning about the object.

It has been brought to our attention that the object has featured in a periodical publication with an interest in environmental themes.  We know that often amongst groups with an interest in that area there can be characters that have little regard for authority, they may do things that seem harmless but can have a wider social and cultural impact.  These fringe elements can often appear eccentric, however we should not underestimate the threat they pose.  The simple act of climbing a five bar gate may seem of no consequence, but consider that these elements may be laying down aniseed trails to foil our dog tracking, they may be digging tunnels, camping in trees, staring at bulls in a manner likely to induce confusion, in short they may be partaking in a whole host of behaviours that cannot be tolerated in ordered society.



Now to the matter in hand.

We understand that there has been some misdirection recently with regard to the object.  This is the latest image we have at our disposal.




There is documentary evidence from a cell of subversives that this is some sort of insect-larval stage which has failed due to parasitisation.  This is unlikely to be the case.  We need to set a team of investigators on the case, undercover, at our earliest opportunity.


Consume, decompose, digest, analyse, unpick, deconstruct, and commit to memory, these following perfidious tracts on the object.

Exhibit 1

Exhibit 2

Exhibit 3

Exhibit 4

Exhibit 5

Exhibit 6

Exhibit 7

If there is the tiniest chance that discovery might take place and that the secrecy of the case is compromised then agents are to leave the field immediately.  Further orders are to follow.


































No comments:

Post a Comment