[ARG] The Pizza Code Mystery

Okay, I literally just found this ARG a few minutes ago, so I’m not too certain what has or hasn’t been done yet. But I do have one question for right now: Has anyone tried to isolate the static in the recently-found EAS? If so, can it be converted to an image with a similar method to how you guys found Code C?

EDIT: Another thing, has anyone tried to see where the IP in terminal.brf.us goes? Is it a red herring?

From
https://forums.blackmesasource.com/showthread.php?t=19247

P.S. Who is Thomas Dashley?

The IP goes nowhere because it’s an in network IP.

Hey, did anyone see this https://www.bmrf.us/img/ ? It seems like at one point (Or its a red herring) the website was / will be a legit looking website for BMRF.

Hi, new here. Found the main stylesheet in https://bmrf.us/style.css and javascript files in https://bmrf.us/js/ but still can’t find the real index page.

That doesn’t answer my other question. Can the static in the EAS be isolated from the speech and translated to an image? If so, that may yield a clue.

it was a legit looking website as you can see here

https://web.archive.org/web/20140517003806/https://bmrf.us/

That’s all for the original site that existed up until yesterday morning.

I haven’t found any clues in the jpg covering the page by looking at the actual image nor by using a hex editor.
I do think someone else should have a more experienced look at it, there might be something in there.

Was there by any chance a login for that site?

Nope, that’s the webhosting CPanel, almost every webhosting service have it.

Ok so im new here, and i literally just now learned of the pizza code ARG. i keep trying to read the wiki but it’s really confusing and i was wondering if anyone would mind giving me a run down of what is going on, what is happening, what is solved, what isn’t. Thanks in advanced.

Hi everybody, I’m new to the forum and to the ARG. I’ve been listening to the recorded message found at bmrf.us, and I found that the first seconds could give us some information, since it should be the SAME protocol used to encode the EAS.
Somebody could try to decode it, maybe we could find something interesting :slight_smile:

https://en.wikipedia.org/wiki/Specific_Area_Message_Encoding

ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-
This is the message heading, but it leads to Florida. People in chat believe the audio is from this message. https://www.youtube.com/watch?v=OUcBnBuOY6g

If “Time Solves All”, and we have the time of the incident as 9:47 am, could this be related to cracking the large string of hex numbers? I’ve never attempted to solve an ARG like this, but the 9th and 47th Hex strings in the 752 hex code are 247923DC and
4FE7E46A : the former being particularly interesting because it contains all three of the numbers 9, 4 and 7. I’m probably spewing bullshit here but eh, there’s a chance. It might also be useful to look at all of the hex strings that contain the digits 9 4 and 7. Again, I’m probably wasting your time.

Got a bit more from it:

ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-|U__
ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-’|__
ZCZC-EAS-RWT-012057-012081-012101-012103-012115+0030-2780415-WTSP/TV-m____

These correspond to the 3 tones.

EDIT: Funnily enough, the RWT corresponds to a test of the system, not an unknown emergency code, which would be (according to wikipedia) ??E.

This really strange. I’ve been seeing the number 47 around this ARG and it all seems to be connected to the 752 hex code.
Here’s an example of that.

Also, does anyone have a link to the page with the message about the Tau Cannon on?

someone posted something about the video the voice is from
and in the description there was “RELAYED BY NATIONAL WEATHER SERVICE PITTSBURGH PA
753 PM EDT TUE MAR 12 2013”
the number 753 maybe a coincidence but what if in 752 code there was waiting another number?

(new here)

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.