How Geocaching Works
Use of geocaching.com services is subject to the terms and conditions in our disclaimer
Easy trail; difficult clues. Beginning coordinates represent a location you might pass on the way. Nothing to be found there. New data: It appears that hide and seek stego program is only compatible with 32bit operating system. Not sure if Win7 64 bit can be run in some compatibility mode to get the job done.
We have lost agent VIPER in the field during a classified mission. During his last transmission, prior to jumping from his aircraft over enemy territory, he sent a single digitized photograph containing hidden information. The only prior use of a similar technique was documented during an analysis of a message that is believed to have originated from outside of our solar system. Details can be found under "Contact Cache." We are using a technique developed in our lab by Dr. Allan Latham. While our agency does not use the same software algorithm, it is similar, and in the public domain. I recommend use of your agencies' classified CRAY computers. Download the photo and analyze in depth. Should we receive additional transmissions from our agent, they will be posted. To protect our agent, any clues posted will be deleted.
(No hints available.)