6First Symptoms Part 2
29Close Proximity
7ACT 2 — SYMPTOMS IN THE NOISE
30Data in the Ruins Part 1
8The Leak
31Data in the Ruins Part 2
9Bite Radius
32Closing In
10ACT 3 — COLLAPSE OF EXPLANATION
33ACT 6 — THE LOOSE THREAD
11Shelter in Place Part 1
34The Loose Thread
12Shelter in Place Part 2
35The Mistake
13Containment Is a Lie
36The Hunter Becomes the Hunted Part 1
14Ghost Infrastructure Part 1
37The Hunter Becomes the Hunted Part 2
15Ghost Infrastructure Part 2
38Collapse Doctrine
16The Spread Curve Part 1
39Breach Point
17The Spread Curve Part 2
40ACT 7 — INSIDE THE MACHINE
18Human Threats Part 1
41The Threshold
19Human Threats Part 2
42Operational Doctrine
20ACT 4 — THE ENGINEERED TRUTH
43The Cost of Proof
21Payload Architecture
44Out of the Kill Zone
22The First Twist
45ACT 8 — WHAT MUST SURVIVE: Carrying the Cure Part 1
23Dead Drops
46ACT 8 — WHAT MUST SURVIVE: Carrying the Cure Part 2