[ARG] The Pizza Code Mystery

Oops

The EAS sounds at the init are copied from a child abduction EAS alert video.

In the audio description, Age is set to 2013.

Could this be a clue?

Doesn’t count out the possibility that the station code may contain a clue.

Seems the ARG is finally picking up steam again (pun intended).

Hey guys first post here, I don’t know if this is already known but I mapped stromseeker’s site and this are all the ULRs availables :

This one is interesting.

No, that’s already been confirmed as not related to the ARG. See Wibble on the wiki.

What about creating one for bmrf.us?

I wrote a page on the ARG wiki with some information on the clues/hints that have appeared on the wiki itself: Wiki clues

No, I don’t think so. The code is the same as the example SAME header found on wikipedia.

Nothing special on bmrf.us, there is only the /img/ folder

Seems like a TTS punched tape, analyzing spectogram @ Audacity @ EAS_bg

https://www.youtube.com/watch?v=OUcBnBuOY6g

If anyone wants to help, our theory is that EAS_bg ending in the spectogram might be a punch card:

With a punch card under:

EDIT: More tweaking with punch cards

On Stormseeker’s website (no mention on the wiki page) :

/*!
*Oh hai there, someones bein a nosy bounder aren’t they…
*Looking for ARG related stuffs?
*I have a hint for you
*21 goes into 1
*Don’t trust anyone, it’s not safe.
*/

There’s a bunch of scripts in /js/ and images on /ref/ but it’s probably not ARG related…

Jeez. Looks like that hint has been there since Nov 24, 2013!?

EDIT:

ā€œ21 into 1ā€ also appeared in a comment on the wiki.

The EAS background image seems to be lifted from here:

https://i.ytimg.com/vi/pxANzFdVegk/maxresdefault.jpg

This shows up under the second result when searching Google Images for ā€œemergency broadcast systemā€.

The MD5/SHA-1 hashes are exactly the same for both, which leads me to believe there’s nothing hidden inside the file.

PS C:\Users\fade\desktop\bmrf.us> ./fciv.exe -both .\maxresdefault.jpg
//
// File Checksum Integrity Verifier version 2.05.
//
                MD5                             SHA-1
-------------------------------------------------------------------------
a703449f52e344bba78b1c87dda0a78d 73ae00cb0f9aae7cbbe6aed33f1e58a80f5d2b84 .\maxresdefaul
PS C:\Users\fade\desktop\bmrf.us> ./fciv.exe -both .\EAS_bg.jpg
//
// File Checksum Integrity Verifier version 2.05.
//
                MD5                             SHA-1
-------------------------------------------------------------------------
a703449f52e344bba78b1c87dda0a78d 73ae00cb0f9aae7cbbe6aed33f1e58a80f5d2b84 .\eas_bg.jpg

Yeah, that’s odd, maybe they used the same source clip. From what I understand, the guy who put the SAME clip on wikipedia custom made it specifically for the wikipedia article.

The code found in the EAS header:

ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-

translates literally to:

(Using header format information from here. Note: the year can be any year, if it’s a leap year, the date becomes Oct 4)

Where are you seeing this?

It’s in the javascript files in https://www.thestormseeker.com/js/

EDIT: The last-modified date of pl.js is Mon, 25 Nov 2013 02:20:01 GMT. Unless the file dates have been modified, those files have been there for quite a while.

This has nothing to do with the IP : Port (ā€˜1.192.12.156:2828’) on the BMRF terminal? Maybe we have to replace/add something to it and do some manual connection.

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.