6Chapter 6 – Rogue Broadcast
32Chapter 32 – Recon Sequences
7Chapter 7 – Safehouse Echoes
33Chapter 33 – Handler’s Return
8Chapter 8 – Old Files, New Names
34Chapter 34 – Moral Fracture
9Chapter 9 – Isolation Protocol
35Chapter 35 – Loop of Lies
10Chapter 10 – First Contact
36Chapter 36 – Human Malware
11Chapter 11 – Burner Phone
37Chapter 37 – Escape Vector
12Chapter 12 – Anonymous Message
38Chapter 38 – Identity Rewrite
13Chapter 13 – Subway Disguise
39Chapter 39 – Network Collapse
14Chapter 14 – Pattern Break
40Chapter 40 – Threshold Breach
15Chapter 15 – Violet Reappears
41Chapter 41 – Reprogram the Prophet
16Chapter 16 – Neural Net
42Chapter 42 – Final Elicitation
17Chapter 17 – Algorithmic Guilt
43Chapter 43 – Shadows and Neon
18Chapter 18 – Tail Evasion
44Chapter 44 – Code of Sacrifice
19Chapter 19 – No-Fly Limits
45Chapter 45 – Burn the Mirror
20Chapter 20 – Cryptic Coordinates
46Chapter 46 – New Alias, New Life
21Chapter 21 – Pandion Unveiled
47Chapter 47 – Watchlist Blue
22Chapter 22 – Predictive Ghost
48Chapter 48 – Clean Slate
23Chapter 23 – Rogue Threads
49Chapter 49 – Vanished Trace
24Chapter 24 – Silent Witnesses
50Chapter 50 – Disappearing Act
25Chapter 25 – Crisis Simulation
51Chapter 51 – Coastal Silence
26Chapter 26 – Doppelgänger File
52Chapter 52 – Epilogue: Nobody Free