1PROLOGUE: CONSERVATION MODE
10CHAPTER NINE: WEREWOLF INTERVENTION
2CHAPTER ONE: EVOLVED METHODOLOGIES
11CHAPTER TEN: DISTRIBUTED COUNTERMEASURES
3CHAPTER TWO: DEFECTOR INTELLIGENCE
12CHAPTER ELEVEN: CENTRAL THRESHOLD
4CHAPTER THREE: ACCELERATED DEPLOYMENT
13CHAPTER TWELVE: CONSERVATION FAILURE
5CHAPTER FOUR: PERIMETER BREACH
14CHAPTER THIRTEEN: SHADOW CONVERGENCE
6CHAPTER FIVE: FRACTURED ARCHITECTURE
15CHAPTER FOURTEEN: THRESHOLD COLLAPSE
7CHAPTER SIX: SHADOW TETHERING
16CHAPTER FIFTEEN: RESIDUAL AWARENESS
8CHAPTER SEVEN: IMPRISONED ALLIES
17EPILOGUE: EXPANDED PARAMETERS
9CHAPTER EIGHT: PARASITIC EVOLUTION
18Copyright: