Skip to Content

Mystery Cache

PMC2 - Numbers Station

Hidden : 4/4/2010
In Pennsylvania, United States
Difficulty:
5 out of 5
Terrain:
3 out of 5

Size: Size: regular (regular)

Join now to view geocache location details. It's free!

Watch

How Geocaching Works

Please note Use of geocaching.com services is subject to the terms and conditions in our disclaimer.

Geocache Description:




NOTE: The published coordinates listed above are bogus. There is no need to visit there.


The PMC2 is a series of fiendishly difficult puzzles created by 18 of the best Puzzle Masters in the Mid-Atlantic Region. In each of these caches you will find a user name and password. After you enter each user name and password into the site listed below, you will be taken to a page with a short puzzle and ultimately a final puzzle piece. Assemble these pieces and find the final cache!

BEGIN YOUR JOURNEY HERE


This series is designed to lead you on an epic adventure that will require Master puzzle-solving skills and extensive travel to unique locations. You must travel and log in at each cache in order to claim a find on the final. Due to the extensive time and effort put into this challenge, the cache can be done as a group but each member of the group must go to each cache site and sign each log. Dividing into sub groups and pooling their efforts will not be allowed.

All 18 caches will be released sporadically between now and the EVENT to be held in June. To make them easy to find we have created a WEBSITE that will have a complete list of all the available PMC caches in all 4 series as they are published.


All PMC2 Series Caches can be Found Here



PMC2 - Numbers Station

­The Art of Espionage
The word "espionage" comes from the French word, "espionner," which means "to spy," The word "spy" stems from various older words meaning "to look at or watch," such as the Latin "specere" or the Anglo-Norman "espier." S
uccess to espionage is, technically, a game of hide and seek.

When secret information is passed from a spy to its intended recipient, it must be hidden so that the enemy doesn't suspect anything. This could ruin the spy's cover, or lead the enemy to deliberately supply misinformation. A great deal of espionage revolves around secret codes. Until the early 20th century, spies resorted to invisible inks to hide messages between the lines or on the bac­k of non-suspicious correspondence. Sugar solutions or lemon juice are invisible until heated. Other chemicals don't appear until the paper is painted with a specific reagent.

One time-tested method for relaying information is a dead drop. Many times the receiver of the message would never even meet the man who stole the sensitive documents. The spy would use an agreed upon predetermined destination often referred to as a “dead drop”. A dead drop is a secret hiding place somewhere in public (sound familiar?). It could be behind a loose brick in a wall at the city park, or in a water tight container hidden under a wood pile off a beaten forest path. When a spy has a message to send, he goes about his daily business, perhaps picking up some dry cleaning or walking his dog on a regular schedule. Deviating from his usual routine while in the public eye would surely arouse suspicion. He passes by the dead drop and deposits the message casually. The spy then has to leave a signal to let the intended receiver know there is a message to be retrieved. A yellow smiley face on a beam 30 feet above the river, or even a cryptic message on a public website are just a couple of examples. Only the intended receiver knew the correct signs to watch for.

Spy controllers can use one-way communication t­o issue instructions to spies. The mysterious Numbers Stations in operation around the world are used for this purpose. A Numbers Station is a government operated radio station broadcasting intermittently on the short-band frequencies. A certain song or announcement will mark the beginning and end of each broadcast, which consists solely of a voice, possibly altered electronically, reciting a long series of numbers. Numbers are used as they are the international language. Every language known to man has some form of number system. These numbers are coded messages which requires deciphering by the intended recipient. These number strings are usually decoded using a virtually unbreakable cipher known as a one-time pad.

Data Analysis
The acquisition and transmission of secret information is meaningless if the information isn't properly analyzed and acted upon. Many spy missions have the sole purpose of obtaining a device used to encode and, in this case decode a message. Sometimes the device can be very hard to come across such as a working
Enigma machine. Other times the device can be a common household object. Decrypting the data is only the first step to data analysis. Proper data analysis will fully develop an overall picture of strategies. Spies spend as much time feeding false information to their enemies as they do gathering information. This allows plenty of room for miscalculations. History is blunder-riddled with acting upon such offal. Proper data analysis is pertinent in determining distinction between valuable and invaluable correspondence. For these reasons a crypto-linguists work must be very detailed, well organized, and carefully worded.

 

holman.jpgHolman’s Apologue
Holman was a spy for an Eastern Bloc country. Which country exactly remains classified to this day. Holman was good at what he did. He knew how to execute a plan successfully on every level. Thinking ahead was how he always kept his edge. He was very knowledgeable. The things he didn’t know he learned and always retained that knowledge. As a result of years of hard work, practice, and a little trial and error, he could easily tell the good correspondence from the bad. He never let himself become confused between his spy operations and his public cover. He made an art out of intertwining these two sides together.

Circa mid-1960’s the US was about to participate in a major foreign conference. The F.B.I. had intercepted international correspondence from a Numbers Station using a short-wave radio. They felt this was valuable information that needed decoding prior to the upcoming peace conference. The F.B.I. had been aware of Holman’s decoding abilities and started working with Holman’s wife trying to get him to defect. Holman would agree to defect only after he had assurance that his children, who were to remain in his homeland, were to be kept safe.

The F.B.I. succeeded in convincing Holman to abscond. Holman the intelligence operative becomes Holman the defector. To keep Holman protected from the country he abandoned, a bombing was staged at a nightclub leaving behind a badly burned body believed to be Holmans. The head of the Bureau tried to convince Holman’s homeland that he was dead.

Your Mission
This is where you come in. Due to Holman’s absconding, you are now needed to locate and interpret the correspondence for us. Holman hid a copy of it prior to leaving for the US of A. Only Holman knows where it is and how to decode. It is your mission to retrieve the secret document and solve it's mysteries. In the interest of our security you must discover how to go about this task on your own. Do not try to contact Holman. The F.B.I. has him in protective custody. Once the message is properly decoded you can proceed to the dead drop locale it provides you. Find what was left for you there and do not misplace it as you will need this newly acquired correspondence on a future secret mission, specifically
Dossier #XXX2 . In addition you will need to sign the enclosed log by your handle and date to prove you were there.

Penalty for Failure
Capture is not an option so avoid your government’s agents. I believe such Bureau agents in your country are commonly referred to as “muggles”. Finally and most importantly: turning double agent by means of sharing any of your acquired information, sharing Holman’s secret location that holds his Numbers Station transmittal, disclosing decoding device or procedures to others, or sharing the dead drop locale with anyone is punishable by death. This is the standard penalty for such treasonous acts..

Objective Attainment
A job well done is certainly its own reward. Completion of this mission is imperative. This mission is only one small component to a greater contrivance, a device of many intricately detailed working parts. To achieve the desired outcome of this mission is prodigious. Therefore to the one who earns the distinguished FTF will be rewarded with, in addition to bragging rights, a one-year subscription to geochaching.com premium membership. If you already have ownership of this privilege, an additional year will be added to your current subscription. Teams that find this cache together will need to collectively agree on who’s caching handle will receive this reward.

 

hit counter
hit counter
YOU MUST BRING YOUR OWN WRITING UTENSIL

FTF Accolades Earned By: ~~~ JohnnyKay ~~~


Congratulations to ~~~ Mmammel ~~~ for First to Solve

Additional Hints (No hints available.)



 

Find...

32 Logged Visits

Found it 12     Didn't find it 2     Write note 17     Publish Listing 1     

View Logbook | View the Image Gallery

**Warning! Spoilers may be included in the descriptions or links.

Current Time:
Last Updated: on 11/15/2017 3:39:14 PM (UTC-08:00) Pacific Time (US & Canada) (11:39 PM GMT)
Rendered From:Unknown
Coordinates are in the WGS84 datum

Return to the Top of the Page