Skip to content

Cloak & Dagger Mystery Cache

This cache has been archived.

mblatch: It is with much sadness that Agency Headquarters announces that the Cloak & Dagger spy training adventure has been retired. I had a great time in researching various spy tactics to create the puzzle, and I hope that everyone who participated equally enjoyed it. It is through this cache that I first had the opportunity to meet many people who would become my best caching friends. Over the 7 years this has been active, the online puzzle unfortunately has become broken, and now, several of the physical stages have gone missing and will be very difficult to replace for the puzzle to work properly. Since I no longer reside in New Jersey, I have decided to archive the cache and open up the various areas to new hides.

Director mblatch out.

More
Hidden : 8/27/2007
Difficulty:
5 out of 5
Terrain:
2.5 out of 5

Size: Size:   small (small)

Join now to view geocache location details. It's free!

Watch

How Geocaching Works

Related Web Page

Please note Use of geocaching.com services is subject to the terms and conditions in our disclaimer.

Geocache Description:

Cache will hold small tradeable items. Please bring your own pen.

*** Top Secret Communication***

To Operative Codename: Gumshoe

Puzzle not intended to be solved in a single day and involves a fair amount of driving. Highly recommend recording and retaining all information at each stage, so bring pen and paper. WARNING!!! This message will self-destruct in 10 seconds.

*************************************************************************************
The Story

Espionage is the process of obtaining secret or confidential information about an organization or society without the permission of the holder of the information. Unlike other forms of intelligence work, espionage involves accessing the place where the desired information is stored, or accessing the people who know the information and will divulge it through some kind of subterfuge. Espionage is usually part of an institutional effort, and the term is most readily associated with state spying on potential or actual enemies, primarily for military purposes. Many nations routinely spy on both their enemies and allies, although they maintain a policy of not making comment on this. A spy, or intelligence agent, is a person employed to obtain such secrets and who specializes in the gathering, fusion, and analysis of information in order to provide advice to their government. In general, intelligence agents are recruited by foreign agencies to spy on their own governments. These agents can be moles, who are recruited before having access to secret information, or defectors, who are recruited after they have the information.

Incidents of espionage are well documented throughout history. The ancient writings of Chinese and Indian military strategists contain information on deception and subversion. The ancient Egyptians had a thoroughly developed system for the acquisition of intelligence, and feudal Japan often used ninja to gather intelligence. During World War I, the infamous femme fatale Mata Hari, although officially a neutral Dutch citizen, used the art of seduction as a means of obtaining intelligence for the Germans. The Cold War involved intense espionage activity between the United States of America and its allies and the Soviet Union and the People's Republic of China and their allies, particularly related to nuclear weapons secrets. The Soviet Union has been said to have had fielded the largest and most advanced spy networks during its time, infiltrating some of the most secure places on the planet, and causing many scandals. For three decades, the United States has cultivated the field of communication and control. As technology has advanced, the means and methods of espionage have advanced, from Nixon-era wire tapping, through Reagan-era programs like ECHELON and Carnivore , to surveillance of all electronic transmissions including cell phone logs, voice mail, email, packet sniffing, trace routing and wireless transmissions.

The risks of espionage vary. A spy may be breaking the host country's laws and can be deported, imprisoned, or even executed, like Julius and Ethel Rosenberg. A spy breaking his/her own country's laws can be imprisoned for espionage. For example, when Aldrich Ames handed a stack of dossiers of CIA agents to his KGB-officer "handler," the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the FBI, he faced life in prison; his contact, who had diplomatic immunity, was declared persona non grata and taken to the airport. Ames's wife was threatened with life imprisonment, and was given a five-year sentence when her husband cooperated. Hugh Francis Redmond, a CIA officer operating in China without diplomatic cover, spent nineteen years in a Chinese prison for espionage.

*************************************************************************************
The Mission

Like any good spy story, this puzzle is a riddle inside a mystery wrapped in an enigma. Your mission, Gumshoe, should you choose to accept it, is to put on your fedora and trench coat and enter the world of espionage, where things are seldom as they seem and never as they appear.

Your journey begins with a three-stage Training Challenge mission. All three challenge puzzles are designed to teach you about various espionage techniques and have been hidden online by various members of an intricate network of operatives. Varying degrees of driving are involved because the clues for locating and accessing these puzzles have been hidden in micro caches throughout north-central New Jersey. All training stages are hidden in very public places, so extreme stealth is required!! The posted coordinates will take you to the first micro cache containing the information for locating Training Challenge 1. All Training Challenge puzzles can be found online using the clues provided in the micro caches without the need to contact any of the operatives. To preserve the thrill of the hunt, all operatives have been sworn to absolute secrecy and may, in fact, provide false information if contacted directly. You must solve each portion of the Training Challenge in order to advance to the next stage.

In addition to solving each puzzle to locate the next Training Challenge stage, an encrypted message intercepted from the Department of Geocaching Security has been placed within each puzzle file. These three messages, when properly decrypted, provide the location of a top secret stash of agency field supplies. The encrypted messages have nothing to do with solving the Training Challenge puzzles and are themselves the puzzle for finding the final cache. However, these messages are completely undecipherable without the agency’s secret codebook, which you must earn access to.

Once you have completed the Training Challenge and proven yourself worthy of the title “Secret Agent”, you will have earned the trust of an undercover agent operating from within the Department of Geocaching Security who will provide you with the whereabouts of the agency codebook so that you may decipher the messages, solve the puzzle, and discover the location of the secret stash. Should you fail in your mission, Pofe will, as always, disavow all knowledge of your actions.

*************************************************************************************
The Rules

In order to preserve the difficulty level and fun of solving the puzzles for everyone, the cache owner requests that you please abide by the following rules while participating in this game of Cloak & Dagger :

1. To log this cache, all participants much sign the physical log at each of the various stages of the puzzle, including the three Training Challenge micro stages, the codebook, and the final stage. The owner will maintain a Cloak & Dagger Hall of Fame listing all of the participants who have successfully completed the mission. Each participant must physically travel to all of the locations and sign the log for himself/herself. If special circumstances require, you may sign for someone else as long as they are physically present on the find. If you have questions regarding this rule, please contact the cache owner.

2. Working in groups is permissible. However, you may only discuss information that all members already have in common. In other words, please do not disclose locations of the micro caches or locations/access codes to the online puzzles with members of your group that have not yet solved the puzzles themselves or traveled to the various locations to sign the logs. If you have solved puzzles that other members in your group have not, you may provide additional clues/hints as you see fit, but please do not disclose the solutions to them directly. This rule is intended to preserve the 5-star difficulty rating for all participants.

3. Feel free to post notes on the cache webpage telling others of your progress and pictures of the physical logbooks containing your signature. However, please respect the right of others to solve the puzzles without aid and be mindful of what you post. Do not include hints for puzzle locations or solutions, clues revealing the locations of the various stages, pictures of cache containers, or any other information that could be deemed detrimental to the cache's top secret nature. All questionable logs will be subject to deletion at the owner's discretion.

4. And of course, have fun!! Tremendous effort was put into making this cache as challenging, fun, and educational as possible. The owner sincerely hopes you have as much fun solving the puzzle as he did creating it.


Cloak & Dagger Spy School: Trainees and Graduates
Mission Completed Secret Agents Agents-in-Training
1. Agent CondorTrax - 04 Sept 2007 (co-FTF) avgraphics addisonbr
2. Agent Resolution/Greg2dot0 - 04 Sept 2007 (co-FTF) dollarbell bzdreamer
3. Agent EagleTrax - 12 Sept 2007 fullhseluvr1982 chinster
4. Agent Moya Crew - 12 Sept 2007 GRozecki gipsie
5. Agent moozehead2020 - 18 Sept 2007 jsarche
(Colorado Agent)
GranAndPap
6. Agent GerIRL - 24 Sept 2007 mike380 joescout
7. Agent KBer - 24 Sept 2007 Pirate & Crafty
(Pennsylvania Agent)
PittCaleb
8. Agent BlueOrca - 26 Sept 2007 - PTBilly
9. Agent TwoCat - 03 Oct 2007 - RangerFan1
10. Agent ekitt10 - 06 Oct 2007 - smrich
11. Agent ericles - 20 Oct 2007 - ThE MaD RuSsIaN
12. Agent admo1972 - 03 Nov 2007 - Windux
13. Agent gl2bear - 10 Oct 2008 - -
14. Agent Sir Dipsalot - 17 May 2009 - -
15. Agent Leglamps - 17 May 2009 - -
16. Agent vanm - 22 May 2009 - -
17. Agent trowel32 - 20 June 2009 - -
18. Agent tmmiller - 25 August 2009 - -
19. Agent Dkeato - 01 May 2010 - -
20. Agent D'orrNights - 09 January 2011 - -
21. Agent camelprodder - 17 April 2011 - -
22. Agent seam2read - 17 April 2011 - -
23. byronigoe - 28 October 2011 - -
24. Agent BigA800 - 28 Janyary 2012 - -

Additional Hints (Decrypt)

Fgntr 1: Zntargvp xrl ubyqre. Fgntr 2: Xrrc lbhe urnq qbja. Fgntr 3: Unir n frng. Sne yrsg, haqrearngu. Cyrnfr ercynpr pnershyyl. Pbqrobbx: Tb vafvqr. Ab TCFe erdhverq. Abg ninvynoyr 24/7. Svany: Fznyy ybpx-naq-ybpx.

Decryption Key

A|B|C|D|E|F|G|H|I|J|K|L|M
-------------------------
N|O|P|Q|R|S|T|U|V|W|X|Y|Z

(letter above equals below, and vice versa)