1PROLOGUE – THE INTERFERENCE BEGINS
8PART III – VAULT BREACH (continued)
2PART I – ECHOES OF CONTROL
9PART III – VAULT BREACH (continued)
3PART II – FRAGMENT PROTOCOL
10PART IV – MEMORY WEAPON
4PART II – Introduction of the Mirror Table
11PART V – THE BROADCAST ATTEMPT
5PART II – FRAGMENT PROTOCOL (conclusion)
12EPILOGUE – SIGNAL RESIDUE