1PROLOGUE: CONSERVATION MODE
10CHAPTER NINE: WEREWOLF INTERVENTION
2CHAPTER ONE: EVOLVED METHODOLOGIES
11CHAPTER TEN: DISTRIBUTED COUNTERMEASURES
3CHAPTER TWO: DEFECTOR INTELLIGENCE
12CHAPTER ELEVEN: CENTRAL THRESHOLD
4CHAPTER THREE: ACCELERATED DEPLOYMENT
13CHAPTER TWELVE: CONSERVATION FAILURE
5CHAPTER FOUR: PERIMETER BREACH
14CHAPTER THIRTEEN: SHADOW CONVERGENCE