Oops
The EAS sounds at the init are copied from a child abduction EAS alert video.
In the audio description, Age is set to 2013.
Could this be a clue?
Doesnāt count out the possibility that the station code may contain a clue.
Seems the ARG is finally picking up steam again (pun intended).
Hey guys first post here, I donāt know if this is already known but I mapped stromseekerās site and this are all the ULRs availables :
This one is interesting.
I wrote a page on the ARG wiki with some information on the clues/hints that have appeared on the wiki itself: Wiki clues
No, I donāt think so. The code is the same as the example SAME header found on wikipedia.
If anyone wants to help, our theory is that EAS_bg ending in the spectogram might be a punch card:

With a punch card under:

EDIT: More tweaking with punch cards
On Stormseekerās website (no mention on the wiki page) :
/*!
*Oh hai there, someones bein a nosy bounder arenāt theyā¦
*Looking for ARG related stuffs?
*I have a hint for you
*21 goes into 1
*Donāt trust anyone, itās not safe.
*/
Thereās a bunch of scripts in /js/ and images on /ref/ but itās probably not ARG relatedā¦
Jeez. Looks like that hint has been there since Nov 24, 2013!?
EDIT:
ā21 into 1ā also appeared in a comment on the wiki.
The EAS background image seems to be lifted from here:
https://i.ytimg.com/vi/pxANzFdVegk/maxresdefault.jpg
This shows up under the second result when searching Google Images for āemergency broadcast systemā.
The MD5/SHA-1 hashes are exactly the same for both, which leads me to believe thereās nothing hidden inside the file.
PS C:\Users\fade\desktop\bmrf.us> ./fciv.exe -both .\maxresdefault.jpg
//
// File Checksum Integrity Verifier version 2.05.
//
MD5 SHA-1
-------------------------------------------------------------------------
a703449f52e344bba78b1c87dda0a78d 73ae00cb0f9aae7cbbe6aed33f1e58a80f5d2b84 .\maxresdefaul
PS C:\Users\fade\desktop\bmrf.us> ./fciv.exe -both .\EAS_bg.jpg
//
// File Checksum Integrity Verifier version 2.05.
//
MD5 SHA-1
-------------------------------------------------------------------------
a703449f52e344bba78b1c87dda0a78d 73ae00cb0f9aae7cbbe6aed33f1e58a80f5d2b84 .\eas_bg.jpg
Yeah, thatās odd, maybe they used the same source clip. From what I understand, the guy who put the SAME clip on wikipedia custom made it specifically for the wikipedia article.
The code found in the EAS header:
ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-
translates literally to:
(Using header format information from here. Note: the year can be any year, if itās a leap year, the date becomes Oct 4)
Where are you seeing this?
Itās in the javascript files in https://www.thestormseeker.com/js/
EDIT: The last-modified date of pl.js is Mon, 25 Nov 2013 02:20:01 GMT. Unless the file dates have been modified, those files have been there for quite a while.
This has nothing to do with the IP : Port (ā1.192.12.156:2828ā) on the BMRF terminal? Maybe we have to replace/add something to it and do some manual connection.


